Author of the publication

Media Access Control Address Spoofing Attacks against Port Security.

, , , and . WOOT, page 1-8. USENIX Association, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Fault Tree Analysis with Cobit 5 Risk Scenarios., , and . CoDIT, page 385-390. IEEE, (2018)A Study of the Methods for Improving Internet Usage Policy Compliance., and . CSE (3), page 371-378. IEEE Computer Society, (2009)A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score., , , and . WorldCIS, page 109-113. IEEE, (2011)Angular multichannel sigma filter., , , , and . ICASSP (3), page 745-748. IEEE, (2003)Behavioral-Based Classification and Identification of Ransomware Variants Using Machine Learning., , and . TrustCom/BigDataSE, page 1560-1564. IEEE, (2018)Comparative Analysis of ccTLD Security Policies., , , , and . SocialCom/PASSAT, page 926-933. IEEE Computer Society, (2010)An Analysis of CVSS v2 Environmental Scoring., , , and . SocialCom/PASSAT, page 1125-1130. IEEE Computer Society, (2011)Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine Learning., , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 391-406. Springer, (2019)Private Blockchain Network for IoT Device Firmware Integrity Verification and Update., , and . HASE, page 164-170. IEEE, (2019)SCAP benchmark for Cisco router security configuration compliance., , and . ICITST, page 270-276. IEEE, (2015)