Author:Nick Rahimi

Publications

Keyphrases

Anonymity2, Anti-Censorship, Architecture, block, Broadcast, censorship, Chinese Remainder Theorem, Classifier, Cloud, cryptographic security, Cryptography, Cybersecurity2, Decision Tree, document categorization, Evasion Attack, Fog, Interest-based, Internet, Latency, LDEPTH, machine learning3, Malware, Middle East, neural networks, non-dht, Overlay Multicast, P2P, P2P network, P2P networks, poisoning attack, Proxy, Public-Key Security, Pyramid tree, Residue class3, Scareware, Security, Spam filter, star network, structured P2P network3, text classification, text mining.