Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Survey on network-based botnet detection methods., , and . Secur. Commun. Networks, 7 (5): 878-903 (2014)Observer Effect: How Intercepting HTTPS Traffic Forces Malware to Change Their Behavior., , and . CACIC, volume 790 of Communications in Computer and Information Science, page 272-281. Springer, (2017)OpenADR and Agreement Audit Architecture for a Complete Cycle of a Flexibility Solution., , , , , and . Sensors, 21 (4): 1204 (2021)Entanglement: cybercrime connections of a public forum population., , , and . J. Cybersecur., (2022)Large Scale Analysis of DoH Deployment on the Internet., , , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 145-165. Springer, (2022)Entanglement: Cybercrime Connections of an Internet Marketing Forum Population., , , and . CoRR, (2022)An empirical comparison of botnet detection methods., , , and . Comput. Secur., (2014)How bluetooth may jeopardize your privacy, and . page 315-334. Magdeburger Institut für Sicherheitsforschung, Magdeburg, (2015)Current State of IPv6 Security in IoT., , , and . CoRR, (2021)Heterogeneous LoRa-Based Wireless Multimedia Sensor Network Multiprocessor Platform for Environmental Monitoring., , , , , and . Sensors, 19 (16): 3446 (2019)