Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of largest possible repeated patterns in Indian audio songs using spectral features., , and . CCECE, page 1-5. IEEE, (2016)Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system., and . WPES, page 173-180. ACM, (2014)MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era., , , and . IEEE Symposium on Security and Privacy, page 675-690. IEEE Computer Society, (2016)Understanding the domain registration behavior of spammers., , , , , , and . Internet Measurement Conference, page 63-76. ACM, (2013)Lens aberration compensation in interference microscopy, , , , , , , and . Optics and Lasers in Engineering, (2020)Plasma density turbulence obtained from a Hasegawa-Wakatani drift-wave turbulence model within the BOUT++ framework, , , and . (2016-04-12 2016)Lens aberration compensation in interference microscopy, , , , , , , and . Optics and Lasers in Engineering, (May 2020)Kindred domains: detecting and clustering botnet domains using DNS traffic., and . WWW (Companion Volume), page 707-712. ACM, (2014)Report from the Workshop and Prize on Root Causes and Mitigation of Name Collisions., , and . RFC, (November 2016)Client-side Name Collision Vulnerability in the New gTLD Era: A Systematic Study., , , , , and . ACM Conference on Computer and Communications Security, page 941-956. ACM, (2017)