Author of the publication

A quantitative approach to estimate a website security risk using whitelist.

, , , and . Secur. Commun. Networks, 5 (10): 1181-1192 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallel video processing using embedded computers., , , , , and . GlobalSIP, page 26-30. IEEE, (2017)A 19-mW 2.6-mm2 L1/L2 dual-band CMOS GPS receiver., , , and . IEEE J. Solid State Circuits, 40 (7): 1414-1425 (2005)Cogent confabulation-based hierarchical behavior planner for task performance., , , , , and . SMC, page 3670-3675. IEEE, (2016)Biologically-inspired episodic memory model considering the context information., , and . SMC, page 1471-1476. IEEE, (2016)A quantitative approach to estimate a website security risk using whitelist., , , and . Secur. Commun. Networks, 5 (10): 1181-1192 (2012)SAD: web session anomaly detection based on parameter estimation., and . Comput. Secur., 23 (4): 312-319 (2004)RoboCup 2014 Humanoid AdultSize League Winner., , , , , , , and . RoboCup, volume 8992 of Lecture Notes in Computer Science, page 94-105. Springer, (2014)An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role., , and . Sensors, 19 (8): 1884 (2019)Team THOR's Entry in the DARPA Robotics Challenge Finals 2015., , , , , , , , , and 2 other author(s). J. Field Robotics, 34 (4): 775-801 (2017)L1/L2 dual-band CMOS GPS receiver., , and . ESSCIRC, page 87-90. IEEE, (2004)