Author of the publication

Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.

, , , and . AsiaCCS, page 168-180. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Accelerating data retrieval steps in XML documents.. University of Hull, Kingston upon Hull, UK, (2005)British Library, EThOS.Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape., and . RAID, volume 11050 of Lecture Notes in Computer Science, page 556-576. Springer, (2018)MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications., and . BigData, page 627-635. IEEE Computer Society, (2014)IoT Security and Privacy Labels., and . APF, volume 11498 of Lecture Notes in Computer Science, page 136-147. Springer, (2019)A Method of Traffic Travel Status Segmentation Based on Position Trajectories., , , , , , , , and . ITSC, page 2877-2882. IEEE, (2015)Bandwidth estimation of rate adaption algorithm in DASH., , , , , and . GLOBECOM Workshops, page 243-247. IEEE, (2014)mTRACK - Monitoring time-varying relations in approximately categorised knowledge., and . CISDA, page 1-8. IEEE, (2009)Computational Intelligence Support for Smart Queries and Adaptive Data., , and . CISDA, page 77-84. IEEE, (2007)Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization., , , , and . CoRR, (2019)Granular Association Rules for Multiple Taxonomies: A Mass Assignment Approach., , and . URSW (LNCS Vol.), volume 5327 of Lecture Notes in Computer Science, page 224-243. Springer, (2008)