Author of the publication

On Scalable Security Audit for Web Application According to ISO 27002.

, and . CN, volume 160 of Communications in Computer and Information Science, page 289-297. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Modelling of Context-Aware Security for Mobile Devices., , and . Mob. Inf. Syst., (2016)Using PHP and HTML languages to create graphical interfaces and to remote control of programs., and . Ann. UMCS Informatica, 1 (1): 304-309 (2003)Cryptographic protocol for electronic auctions with extended requirements., and . Ann. UMCS Informatica, 2 (1): 391-400 (2004)Adaptive Approach to Network Security., , and . CN, volume 39 of Communications in Computer and Information Science, page 233-241. Springer, (2009)Optimization of TLS security protocol using the adaptable security model., , and . Ann. UMCS Informatica, 9 (1): 59-75 (2009)Voter non-repudiation oriented scheme for the medium scale e-voting protocol., and . IMCSIT, page 325-330. IEEE, (2009)Implementation of certification subprotocol for electronic auction., and . Ann. UMCS Informatica, 3 (1): 355-364 (2005)Secure and Reliable Localization in Wireless Sensor Network Based on RSSI Mapping., , , and . CN, volume 718 of Communications in Computer and Information Science, page 55-69. Springer, (2017)On Scalable Security Audit for Web Application According to ISO 27002., and . CN, volume 160 of Communications in Computer and Information Science, page 289-297. Springer, (2011)A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks., and . SECRYPT, page 728-733. SCITEPRESS, (2021)