Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships | 0 | 0.34 | 2022 |
The Tangled Genealogy of IoT Malware. | 3 | 0.39 | 2020 |
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats. | 1 | 0.35 | 2019 |
Can I Opt Out Yet? - GDPR and the Global Illusion of Cookie Control. | 5 | 0.42 | 2019 |
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. | 1 | 0.36 | 2018 |
Scalable and flexible clustering solutions for mobile phone-based population indicators. | 1 | 0.35 | 2017 |
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. | 0 | 0.34 | 2017 |
RiskTeller: Predicting the Risk of Cyber Incidents. | 7 | 0.46 | 2017 |
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. | 4 | 0.45 | 2017 |
NG-DBSCAN: Scalable Density-Based Clustering for Arbitrary Data. | 0 | 0.34 | 2017 |
Improving Population Estimation From Mobile Calls: A Clustering Approach | 3 | 0.39 | 2016 |
NG-DBSCAN: Scalable Density-Based Clustering for Arbitrary Data. | 13 | 0.52 | 2016 |
Efficient and Self-Balanced ROLLUP Aggregates for Large-Scale Data Summarization | 1 | 0.37 | 2015 |
Scalable K-Nn Based Text Clustering | 8 | 0.51 | 2015 |
Adaptive redundancy management for durable P2P backup | 2 | 0.41 | 2015 |
On Fair Size-Based Scheduling | 0 | 0.34 | 2015 |
Monte Carlo Strength Evaluation: Fast and Reliable Password Checking | 15 | 0.70 | 2015 |
OS-Assisted Task Preemption for Hadoop | 3 | 0.41 | 2014 |
PSBS: Practical Size-Based Scheduling. | 3 | 0.39 | 2014 |
On User Availability Prediction and Network Applications | 3 | 0.38 | 2014 |
On the design space of MapReduce ROLLUP aggregates. | 1 | 0.36 | 2014 |
Trend makers and trend spotters in a mobile application | 1 | 0.37 | 2013 |
A Simulator for Data-Intensive Job Scheduling. | 3 | 0.47 | 2013 |
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems | 8 | 0.63 | 2013 |
Reference Monitors for Security and Interoperability in OAuth 2.0 | 1 | 0.37 | 2013 |
Spotting trends: the wisdom of the few | 2 | 0.39 | 2012 |
Redundancy management for P2P backup | 5 | 0.44 | 2012 |
HiPoLDS: a security policy language for distributed systems | 2 | 0.38 | 2012 |
An Empirical Study Of Availability In Friend-To-Friend Storage Systems | 24 | 0.85 | 2011 |
Data Transfer Scheduling For P2p Storage | 10 | 0.63 | 2011 |
Dependable filtering: Philosophy and realizations | 1 | 0.36 | 2010 |
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype | 13 | 0.63 | 2010 |
On Scheduling and Redundancy for P2P Backup | 3 | 0.45 | 2010 |
Back To The Future: On Predicting User Uptime | 3 | 0.45 | 2010 |
Measuring Password Strength: An Empirical Analysis | 3 | 0.69 | 2009 |
Workshop 18 introduction: Fifth International Workshop on Hot Topics in Peer-to-Peer Systems - HOTP2P | 0 | 0.34 | 2008 |
SOFIA: Social Filtering for Robust Recommendations. | 13 | 0.73 | 2008 |
Mapping Small Worlds | 6 | 0.54 | 2007 |
Neighbourhood maps: decentralized ranking in small-world P2P networks | 5 | 0.52 | 2006 |
DO-Casl: an observer-based casl extension for dynamic specifications | 0 | 0.34 | 2006 |
Injecting Distribution in CASL | 0 | 0.34 | 2005 |