From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stranger danger: exploring the ecosystem of ad-based URL shortening services., , , , , , , , и . WWW, стр. 51-62. ACM, (2014)Application of evolutionary algorithms in detecting SMS spam at access layer., , и . GECCO, стр. 1787-1794. ACM, (2011)FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors., и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 144-163. Springer, (2013)Embedding High Capacity Covert Channels in Short Message Service (SMS)., , , и . STA, том 186 из Communications in Computer and Information Science, стр. 1-10. Springer, (2011)A Framework for Detecting Malformed SMS Attack., , , и . STA, том 186 из Communications in Computer and Information Science, стр. 11-20. Springer, (2011)Graph-based learning model for detection of SMS spam on smart phones., и . IWCMC, стр. 1046-1051. IEEE, (2012)xMiner: Nip the Zero Day Exploits in the Bud., и . NCA, стр. 99-106. IEEE Computer Society, (2011)Driving in the Cloud: An Analysis of Drive-by Download Operations and Abuse Reporting., , и . DIMVA, том 7967 из Lecture Notes in Computer Science, стр. 1-20. Springer, (2013)Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms., , , и . ITNG, стр. 559-563. IEEE Computer Society, (2011)A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks., , и . ICISS, том 7093 из Lecture Notes in Computer Science, стр. 280-293. Springer, (2011)