Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Malicious Threads in Security Forums., , , and . WWW (Companion Volume), page 176-182. ACM, (2019)BIVTECI: a bibliographic visualization tool., , , and . CASCON, page 28. IBM, (1996)Detecting malware with graph-based methods: traffic classification, botnets, and facebook scams.. WWW (Companion Volume), page 495-496. International World Wide Web Conferences Steering Committee / ACM, (2013)QoSMIC: Quality of Service Sensitive Multicast Internet Protocol., , and . SIGCOMM, page 144-153. ACM, (1998)Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia., , and . FOCI @ USENIX Security Symposium, USENIX Association, (2020)IDAPro for IoT Malware analysis?, , , , and . CSET @ USENIX Security Symposium, USENIX Association, (2019)LinkMan: hyperlink-driven misbehavior detection in online security forums., , , and . ASONAM, page 270-277. ACM, (2021)If walls could talk: Patterns and anomalies in Facebook wallposts., , , and . ASONAM, page 367-374. ACM, (2015)TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks., , and . ICNP, page 75-84. IEEE Computer Society, (2006)Network-level characteristics of spamming: An empirical analysis., , and . ICNP, page 25-30. IEEE Computer Society, (2011)