Author of the publication

Method for Evaluating the Security Risk of a Website Against Phishing Attacks.

, , , , , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 21-31. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Response Measurement and Cable Tension Estimation Using an Unmanned Aerial Vehicle., , , and . Remote. Sens., 15 (16): 4000 (August 2023)BLESeis: Low-Cost IoT Sensor for Smart Earthquake Detection and Notification., , , and . Sensors, 20 (10): 2963 (2020)Information Privacy Engineering in ubiComp., , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 628-634. Springer, (2005)CoDocs: An electronic document management system supporting effective collaborative work., , , , and . HCI (2), page 593-597. Lawrence Erlbaum, (1999)Implementation of application-specific DSP for OFDM systems., , , , , and . ISCAS (3), page 665-658. IEEE, (2004)Tendon Stress Estimation from Strain Data of a Bridge Girder Using Machine Learning-Based Surrogate Model., , , , and . Sensors, 23 (11): 5040 (2023)Feasibility Study of the Electromagnetic Damper for Cable Structures Using Real-Time Hybrid Simulation., , and . Sensors, 17 (11): 2499 (2017)Quality measurement of production process plan using tolerance chart., and . CASE, page 25-30. IEEE, (2005)Construction of Asbestos Slate Deep-Learning Training-Data Model Based on Drone Images., , , , and . Sensors, 23 (19): 8021 (October 2023)Systematic Website Verification for Privacy Protection., , , , , and . IAS, page 231-234. IEEE Computer Society, (2008)