Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiments with P2P Botnet Detection., and . it - Information Technology, 54 (2): 90-95 (2012)Security Challenges and Opportunities of Software-Defined Networking., , , , and . IEEE Security & Privacy, 15 (2): 96-100 (2017)Command and Control Structures in Malware: From Handler/Agent to P2P., and . ;login:, (2007)Who Are You Now? Fading to Multiple Personas., , and . WAY@SOUPS, USENIX Association, (2016)Fingerprinting Cryptographic Protocols with Key Exchange Using an Entropy Measure., , and . IEEE Symposium on Security and Privacy Workshops, page 170-179. IEEE Computer Society, (2018)Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes., , , and . IEEE Access, (2022)Building an Active Computer Security Ethics Community., , and . IEEE Security & Privacy, 9 (4): 32-40 (2011)Ethics in Data Sharing: Developing a Model for Best Practice., , , , , , , and . IEEE Symposium on Security and Privacy Workshops, page 5-9. IEEE Computer Society, (2014)A Secure Submission System for Online Whistleblowing Platforms., , , , and . Financial Cryptography, volume 7859 of Lecture Notes in Computer Science, page 354-361. Springer, (2013)Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts., , and . ACSAC, page 131-140. ACM, (2010)