Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware.
J. Cyber Secur. Mobil., 2014
The Anatomy of Clickbot.A.
Proceedings of the First Workshop on Hot Topics in Understanding Botnets, 2007
Foundations of Security - What Every Programmer Needs to Know.
Apress, ISBN: 978-1-59059-784-2, 2007
Maximizing remote work in flooding-based peer-to-peer systems.
Comput. Networks, 2006
An Experimental Study of the Skype Peer-to-Peer VoIP System.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006
Denial-of-service (DoS) attacks and commerce infrastructure in peer-to-peer networks.
PhD thesis, 2005
Authenticity and availability in PIPE networks.
Future Gener. Comput. Syst., 2005
Pong-cache poisoning in GUESS.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Open Problems in Data-Sharing Peer-to-Peer Systems.
Proceedings of the Database Theory, 2003
Query-flood DoS attacks in gnutella.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Experimenting with Electronic Commerce on the PalmPilot.
Proceedings of the Financial Cryptography, 1999
SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations.
Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Boston, Massachusetts, USA, August 31, 1998