Author of the publication

Privacy Principles for Sharing Cyber Security Data.

, , , , , and . IEEE Symposium on Security and Privacy Workshops, page 193-197. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distinguishing between single and multi-source attacks using signal processing., , and . Computer Networks, 46 (4): 479-503 (2004)A taxonomy of capabilities based DDoS defense architectures., , and . AICCSA, page 157-164. IEEE Computer Society, (2011)WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation., , , and . IEEE Trans. Dependable Sec. Comput., 4 (2): 88-104 (2007)ICDAR 2013 Competition on Historical Newspaper Layout Analysis (HNLA 2013)., , , and . ICDAR, page 1454-1458. IEEE Computer Society, (2013)Analyzing the Aftermath of the McColo Shutdown., , , and . SAINT, page 157-160. IEEE Computer Society, (2009)Detecting encrypted botnet traffic., , and . INFOCOM, page 3453-1358. IEEE, (2013)Proteus: A System for Dynamically Composing and Intelligently Executing Web Services., , , , , , , , , and 3 other author(s). ICWS, page 17-21. CSREA Press, (2003)Dynamics of Prefix Usage at an Edge Router., , and . PAM, volume 6579 of Lecture Notes in Computer Science, page 11-20. Springer, (2011)Behavior of DNS' Top Talkers, a .com/.net View., , , , and . PAM, volume 7192 of Lecture Notes in Computer Science, page 211-220. Springer, (2012)An adaptive multiple retransmission technique for continuous media streams., and . NOSSDAV, page 16-21. ACM, (2004)