Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defense against SPIT using community signals., and . ISI, page 232. IEEE, (2009)Goliath: A Configurable Approach for Network Testing., , and . TRIDENTCOM, page 1-9. IEEE, (2007)Behavior analysis of spam botnets., , , and . COMSWARE, page 246-253. IEEE, (2008)Unwanted SMTP Paths and Relays., and . COMSWARE, IEEE, (2007)Tire-road friction estimation utilizing smartphones., and . IRI, page 855-858. IEEE, (2014)Cuffless Differential Blood Pressure Estimation Using Smart Phones., , , , and . IEEE Trans. Biomed. Engineering, 60 (4): 1080-1089 (2013)Predicting Calls - New Service for an Intelligent Phone., and . MMNS, volume 4787 of Lecture Notes in Computer Science, page 26-37. Springer, (2007)Risk Management Using Behavior Based Bayesian Networks., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 115-126. Springer, (2005)Current and Future Trends in Social Media., and . SocialCom/PASSAT, page 1384-1385. IEEE Computer Society, (2011)Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack., and . CIC, page 80-89. IEEE Computer Society, (2018)