Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trojan Detection using IC Fingerprinting., , , , and . IEEE Symposium on Security and Privacy, page 296-310. IEEE Computer Society, (2007)A universal method for composing business transaction models using logs., , , and . Integrated Network Management, page 17-24. IEEE, (2009)Generalized minimum distance decoding in Euclidean space: Performance analysis., and . IEEE Trans. Information Theory, 46 (1): 60-83 (2000)SparkBench - A Spark Performance Testing Suite., , , , , , , , , and . TPCTC, volume 9508 of Lecture Notes in Computer Science, page 26-44. Springer, (2015)On the Design and Quantification of Privacy Preserving Data Mining Algorithms., and . PODS, ACM, (2001)Platform and applications for massive-scale streaming network analytics., , , , , and . IBM Journal of Research and Development, 57 (3/4): 11 (2013)Probabilistic Treatment of MIXes to Hamper Traffic Analysis., , and . IEEE Symposium on Security and Privacy, page 16-27. IEEE Computer Society, (2003)Joint noncoherent demodulation and decoding for the block fading channel: a practical framework for approaching Shannon capacity., , , and . IEEE Trans. Communications, 51 (10): 1676-1689 (2003)Measuring Anonymity: The Disclosure Attack., and . IEEE Security & Privacy, 1 (6): 27-34 (2003)Modeling data flow in socio-information networks: a risk estimation approach., , , and . SACMAT, page 113-122. ACM, (2011)