Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mohaisen, Aziz
add a person with the name Mohaisen, Aziz
 

Other publications of authors with the same name

Trustworthy Distributed Computing on Social Networks., , , and . IEEE Trans. Services Computing, 7 (3): 333-345 (2014)Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles., , , , and . CoRR, (2016)A Privacy-Preserving Longevity Study of Tor's Hidden Services., , , , and . CoRR, (2019)Advances in Mobile Security Technologies., , , and . Mobile Information Systems, (2016)Large-Scale and Language-Oblivious Code Authorship Identification., , , and . ACM Conference on Computer and Communications Security, page 101-114. ACM, (2018)POSTER: Deterring DDoS Attacks on Blockchain-based Cryptocurrencies through Mempool Optimization., , and . AsiaCCS, page 809-811. ACM, (2018)Where Are You Taking Me? Behavioral Analysis of Open DNS Resolvers., , , and . DSN, page 493-504. IEEE, (2019)Digitalseal: a Transaction Authentication Tool for Online and Offline Transactions., , , and . ICASSP, page 6956-6960. IEEE, (2018)BlockTrail: A Scalable Multichain Solution for Blockchain-Based Audit Trails., , , , , and . ICC, page 1-6. IEEE, (2019)Fast and Low-Power Link Setup for IEEE 802.15.3c Multi-Gigabit/s Wireless Sensor Networks., , and . IEEE Communications Letters, 18 (3): 455-458 (2014)