Nick Feamster , Alexander G. Gray , Nadeem Ahmed Syed , Shuang Hao
usenix security symposium 101 -118
Dmitri Alperovitch , Curtis Ide , Sven Krasser
Dmitri Alperovitch , Matthew Brinkley , Sven Krasser
Yuchun Tang , Zhenyu Zhong , Yuanchen He , Sven Krasser
Dmitri Alperovitch , Jonathan Alexander Zdziarski , Phyllis Adele Schneck , Paul Judge
Dmitri Alperovitch , Yuchun Tang , Paul Judge , Sven Krasser
artificial intelligence and pattern recognition 174 -180
David A. Barlow , Vasos Vassiliou , Sven Krasser , Henry L. Owen
Journal of Communications and Networks 7 ( 3) 377 -384
Dmitri Alperovitch , Paul Judge , Sven Krasser
international conference on distributed computing systems workshops 27 -27
Sven Krasser , Julian B. Grizzard , Henry L. Owen , John G. Levine
Journal of Security Education 1 23 -37
Yuchun Tang , Sven Krasser , Paul Judge , Yan-Qing Zhang
collaborative computing 1 -6
Sven Krasser , Yuchun Tang , Jeremy Gould , Dmitri Alperovitch
information assurance and security 255 -261
Sven Krasser , Henry Owen , Joachim Sokol , Jochen Grimminger
European Transactions on Telecommunications 18 ( 1) 35 -47
Yuanchen He , Zhenyu Zhong , Sven Krasser , Yuchun Tang
collaborative computing 1 -6
Hayriye Altunbasak , Sven Krasser , Henry L. Owen , Jochen Grimminger
Networking - ICN 2005 699 -706
Yuchun Tang , Sven Krasser , Yuanchen He , Weilai Yang
global communications conference 1 -5
Sven Krasser , Brett Meyer , Patrick Crenshaw
international workshop on machine learning for signal processing 1 -6
Yuchun Tang , Yuanchen He , Sven Krasser
international conference on machine learning and applications 659 -664
Sven Krasser , Yuchun Tang , Yuanchen He , Zhenyu Zhong
Sven Krasser , Yuchun Tang , Zhenyu Zhong
Nitin Jyoti , Prabhat Kumar Singh , Zhenyu Zhong , Guy William Welch Roberts