Author:Nick Rahimi

Publications

Keyphrases

Anonymity2, Anti-Censorship, Architecture, block, Broadcast, censorship, Chinese Remainder Theorem, Classifier, Cloud, cryptographic security, Cryptography, Cybersecurity2, Decision Tree, Evasion Attack, Fog, Interest-based, Internet, LDEPTH, machine learning2, Malware, Middle East, non-dht, Overlay Multicast, P2P, P2P network, poisoning attack, Proxy, Public-Key Security, Pyramid tree, Residue class2, Scareware, Security, Spam filter, structured P2P network3.