From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices., , и . Proc. Priv. Enhancing Technol., 2022 (2): 578-600 (2022)Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAs., , , , и . SecureComm (2), том 255 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 291-308. Springer, (2018)Trimmer: An Automated System for Configuration-Based Software Debloating., , , , , , , , и . IEEE Trans. Software Eng., 48 (9): 3485-3505 (2022)To route or to secure: Tradeoffs in ICNs over MANETs., , , , и . NCA, стр. 367-374. IEEE Computer Society, (2016)It's All in the Name: Why Some URLs are More Vulnerable to Typosquatting., , , , , , и . INFOCOM, стр. 2618-2626. IEEE, (2018)An Anomaly Detection Fabric for Clouds Based on Collaborative VM Communities., , , , и . CCGrid, стр. 431-441. IEEE Computer Society / ACM, (2017)A Classification Based Framework to Predict Viral Threads., , , , , , , и . PACIS, стр. 134. (2015)To Act or React: Investigating Proactive Strategies For Online Community Moderation., , , и . CoRR, (2019)Are Proactive Interventions for Reddit Communities Feasible?, , , и . CoRR, (2021)Covert channels in online rogue-like games., и . ICC, стр. 761-767. IEEE, (2014)