Author of the publication

Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.

, , , , and . IEEE Symposium on Security and Privacy, page 112-126. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal sanitization synthesis for web application vulnerability repair., , , , , and . ISSTA, page 189-200. ACM, (2016)Urban Traffic Information Service Application Grid., , , , , , , , , and 3 other author(s). J. Comput. Sci. Technol., 20 (1): 134-140 (2005)Quantitative Analysis of Cloud-Based Streaming Services., , and . IEEE SCC, page 216-223. IEEE Computer Society, (2013)Network-traffic anomaly detection with incremental majority learning., , , and . IJCNN, page 1-8. IEEE, (2015)Clustering iOS executable using self-organizing maps., , , and . IJCNN, page 1-8. IEEE, (2013)Improving the genetic-algorithm-optimized wavelet neural network for stock market prediction., , , , and . IJCNN, page 3038-3042. IEEE, (2014)Efficient testability enhancement for combinational circuit., and . ICCD, page 168-179. IEEE Computer Society, (1995)Handwritten character recognition with sequential convolutional neural network., , , , and . ICMLC, page 291-296. IEEE, (2013)Relational String Verification Using Multi-Track Automata., , and . Int. J. Found. Comput. Sci., 22 (8): 1909-1924 (2011)BDD-Based Safety-Analysis of Concurrent Software with Pointer Data Structures Using Graph Automorphism Symmetry Reduction., , , , and . IEEE Trans. Software Eng., 30 (6): 403-417 (2004)