Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Characterizing Peer-to-Peer Streaming Traffic., , , , , and . IEEE Journal on Selected Areas in Communications, 31 (9-Supplement): 175-188 (2013)An Empirical Investigation of Filter Attribute Selection Techniques for High-Speed Network Traffic Flow Classification., , , , , and . Wireless Personal Communications, 66 (3): 541-558 (2012)On traffic characteristics comparison of ADSL and CDMA network., , , , , and . PIMRC, page 1273-1278. IEEE, (2012)Towards Large-Scale Hunting for Android Negative-Day Malware., , , , and . RAID, page 533-545. USENIX Association, (2019)Neural-network design for small training sets of high dimension., and . IEEE Trans. Neural Networks, 9 (2): 266-280 (1998)An efficient analytical model for calculating trapped charge in amorphous silicon., , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 13 (6): 725-728 (1994)Assessing Attack Impact on Business Processes by Interconnecting Attack Graphs and Entity Dependency Graphs., , , , , and . DBSec, volume 10980 of Lecture Notes in Computer Science, page 330-348. Springer, (2018)A shareable keyword search over encrypted data in cloud computing., , , , , and . The Journal of Supercomputing, 74 (3): 1001-1023 (2018)Android STAR: An Efficient Interaction-Preserving Record-Replay System For Messenger App Usage Surveillance., , and . WISEC, page 248-259. ACM, (2018)A Secure and Flexible Data Aggregation Framework for Smart Grid., , , and . EMC/HumanCom, volume 260 of Lecture Notes in Electrical Engineering, page 681-690. Springer, (2013)