Author of the publication

Poster: Novel Client-Side Watermarking Technique for Tor User De-Anonymization.

, and . IMC, page 720-721. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance and economies of 'bot-less' application-layer DDoS attacks., and . ICITST, page 318-323. IEEE, (2014)Application-layer DDoS in dynamic Web-domains: Building defenses against next-generation attack behavior., and . CNS, page 490-491. IEEE, (2014)Web bugs in the cloud: Feasibility study of a new form of EDoS attack., and . GLOBECOM Workshops, page 64-69. IEEE, (2014)RSSI-Based MAC-Layer Spoofing Detection: Deep Learning Approach., and . J. Cybersecur. Priv., 1 (3): 453-469 (August 2021)PIRAT - Tool for Automated Cyber-risk Assessment of PLC Components & Systems Deploying NVD CVE & MITRE ATT&CK Databases., , and . ICCPS, page 237-238. ACM, (2023)The Role of DNS TTL Values in Potential DDoS Attacks: What Do the Major Banks Know About It?, , and . ANT/MobiWIS, volume 10 of Procedia Computer Science, page 466-473. Elsevier, (2012)An adaptive neural network approach to hypertext clustering., and . IJCNN, page 3722-3726. IEEE, (1999)Dirt Jumper: A key player in today's botnet-for-DDoS market., and . WorldCIS, page 239-244. IEEE, (2012)Mozi IoT Malware and Its Botnets: From Theory To Real-World Observations., and . CSCI, page 698-703. IEEE, (2021)Sink mobility in wireless sensor networks: a (mis)match between theory and practice., and . IWCMC, page 386-393. ACM, (2009)