Author of the publication

Media Access Control Address Spoofing Attacks against Port Security.

, , , and . WOOT, page 1-8. USENIX Association, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A software application to analyze the effects of temporal and environmental metrics on overall CVSS v2 score., , , and . WorldCIS, page 109-113. IEEE, (2011)An Analysis of CVSS v2 Environmental Scoring., , , and . SocialCom/PASSAT, page 1125-1130. IEEE Computer Society, (2011)Comparative Analysis of ccTLD Security Policies., , , , and . SocialCom/PASSAT, page 926-933. IEEE Computer Society, (2010)Fingerprint security for protecting EMV payment cards., , and . ICITST, page 95-101. IEEE, (2015)An Enhanced Threat Identification Approach for Collusion Threats., , , and . Metrisec@ESEM, page 25-30. IEEE, (2011)Responding to intrusions in mobile ad hoc networks., , and . WorldCIS, page 30-34. IEEE, (2013)Threat Modeling for CSRF Attacks., , , and . CSE (3), page 486-491. IEEE Computer Society, (2009)Collusion threat profile analysis: Review and analysis of MERIT model., , , , and . WorldCIS, page 212-217. IEEE, (2012)A COBIT and NIST-based conceptual framework for enterprise user account lifecycle management., , , and . WorldCIS, page 150-157. IEEE, (2012)Enhanced User Security and Privacy Protection in 4G LTE Network., , and . COMPSAC Workshops, page 443-448. IEEE Computer Society, (2016)978-1-4673-8845-0.