Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ITA: Innocuous Topology Awareness for Unstructured P2P Networks., , , and . IEEE Trans. Parallel Distrib. Syst., 24 (8): 1589-1601 (2013)A Systematic Characterization of IM Threats using Honeypots., , , and . NDSS, The Internet Society, (2010)Implementation of a Reliable Remote Memory Pager., and . USENIX Annual Technical Conference, page 177-190. USENIX Association, (1996)RRDtrace: Long-term Raw Network Traffic Recording using Fixed-size Storage., , and . MASCOTS, page 101-110. IEEE Computer Society, (2010)Regular Expression Matching on Graphics Hardware for Intrusion Detection., , , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 265-283. Springer, (2009)Incognitus: Privacy-Preserving User Interests in Online Social Networks., , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 81-95. Springer, (2018)Gnort: High Performance Network Intrusion Detection Using Graphics Processors., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 116-134. Springer, (2008)SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms., , and . ISC, volume 7001 of Lecture Notes in Computer Science, page 197-212. Springer, (2011)Improving the accuracy of network intrusion detection systems under load using selective packet discarding., , and . EUROSEC, page 15-21. ACM, (2010)The man who was there: validating check-ins in location-based services., , , and . ACSAC, page 19-28. ACM, (2013)