Author of the publication

Detecting Malicious Domains via Graph Inference.

, , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 1-18. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast submatch extraction using OBDDs., , , , and . ANCS, page 163-174. ACM, (2012)Silent Shredder: Zero-Cost Shredding for Secure Non-Volatile Main Memory Controllers., , , , and . ASPLOS, page 263-276. ACM, (2016)Efficient Transparent Redactable Signatures with a Single Signature Invocation., , and . IACR Cryptology ePrint Archive, (2016)Efficient Submatch Extraction for Practical Regular Expressions., , , , and . LATA, volume 7810 of Lecture Notes in Computer Science, page 323-334. Springer, (2013)Collecting, Analyzing and Responding to Enterprise Scale DNS Events.. CODASPY, page 73. ACM, (2015)Detecting Malicious Domains via Graph Inference., , , and . ESORICS (1), volume 8712 of Lecture Notes in Computer Science, page 1-18. Springer, (2014)Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases., , , , and . Privacy Enhancing Technologies, volume 5672 of Lecture Notes in Computer Science, page 185-201. Springer, (2009)Fast exact and heuristic methods for role minimization problems., , , , , and . SACMAT, page 1-10. ACM, (2008)Certification of computing personnel: prospects and potential impact., , , , and . AFIPS National Computer Conference, volume 43 of AFIPS Conference Proceedings, page 1019-1020. AFIPS Press, (1974)Situational awareness through reasoning on network incidents., , , and . CODASPY, page 111-122. ACM, (2014)