Author of the publication

A Survey on Fake Entities as a Method to Detect and Monitor Malicious Activity.

, and . PDP, page 386-390. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Diversifying SQL to Prevent Injection Attacks., , and . TrustCom/BigDataSE/ISPA (1), page 344-351. IEEE, (2015)Internal interface diversification with multiple fake interfaces., and . SIN, page 245-250. ACM, (2017)Practical implications and requirements of diversifying interpreted languages., , and . CISRC, page 14:1-14:4. ACM, (2016)Towards a diversification framework for operating system protection., , and . CompSysTech, page 286-293. ACM, (2014)A case study on software vulnerability coordination., , , and . Inf. Softw. Technol., (2018)The Effects Playing Pokémon GO has on Physical Activity -A Systematic Literature Review., , , and . HICSS, page 1-10. ScholarSpace, (2020)Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures., and . CompSysTech, page 251-258. ACM, (2012)Diversification of system calls in linux kernel., , and . CompSysTech, page 284-291. ACM, (2015)A Survey on Aims and Environments of Diversification and Obfuscation in Software Security., , , , , , and . CompSysTech, page 113-120. ACM, (2016)Diversification of System Calls in Linux Binaries., , , , , and . INTRUST, volume 9473 of Lecture Notes in Computer Science, page 15-35. Springer, (2014)