Author of the publication

Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code.

, , and . SACMAT, page 73-80. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Technology Overload: Gender-based Perceptions of Knowledge Worker Performance., , and . AMCIS, Association for Information Systems, (2011)Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing., , and . QRS, page 364-373. IEEE, (2017)Developing Soft Skills with a Classroom Behavior Management Game: (Abstract Only)., , , and . SIGCSE, page 1092. ACM, (2018)POSTER: Using Unit Testing to Detect Sanitization Flaws., , and . ACM Conference on Computer and Communications Security, page 1659-1661. ACM, (2015)Exploring the Usability of Open Source Network Forensic Tools., and . SIW@CCS, page 1-8. ACM, (2014)Participatory sensing for community building., and . CHI Extended Abstracts, page 1321-1326. ACM, (2011)A Body of Knowledge for Usable Security and Privacy Education (Abstract Only)., and . SIGCSE, page 494-495. ACM, (2016)"There is nothing that I need to keep secret": Sharing Practices and Concerns of Wearable Fitness Data., and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)Snag'em: Creating Community Connections through Games., , , and . SocialCom/PASSAT, page 591-594. IEEE Computer Society, (2011)Charting new ground: modeling user behavior in interactive geovisualization., , , , and . GIS, page 61. ACM, (2008)