Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SpoofCatch: A Client-Side Protection Tool Against Phishing Attacks., , , , and . IT Prof., 23 (2): 65-74 (2021)Modernizing Legacy Software as Context - Sensitive and Portable Mobile-Enabled Application., , , , and . IT Prof., 23 (1): 42-50 (2021)Formal Analysis of Language-Based Android Security Using Theorem Proving Approach., , , , and . IEEE Access, (2019)Adaptive Security for Self-Protection of Mobile Computing Devices., , , , and . Mob. Networks Appl., 28 (2): 1-20 (April 2023)Automatic and Robust Client-Side Protection for Cookie-Based Sessions., , , and . ESSoS, volume 8364 of Lecture Notes in Computer Science, page 161-178. Springer, (2014)On embedding a hardware description language in Isabelle/HOL., , , and . Des. Autom. Embed. Syst., 23 (3-4): 123-151 (2019)Automatic identification of sarcasm in tweets and customer reviews., , , , , , and . J. Intell. Fuzzy Syst., 37 (5): 6815-6828 (2019)CookiExt: Patching the browser against session hijacking attacks., , , and . J. Comput. Secur., 23 (4): 509-537 (2015)Provably Sound Browser-Based Enforcement of Web Session Integrity., , , , and . CSF, page 366-380. IEEE Computer Society, (2014)Formal Verification of Hardware Components in Critical Systems., , , , , and . Wirel. Commun. Mob. Comput., (2020)