Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cloud-based Protection approach against JavaScript-based attacks to browsers., , , , , and . Comput. Electr. Eng., (2018)Detecting Web-Based Botnets Using Bot Communication Traffic Features., , , , and . Secur. Commun. Networks, (2017)ARMORY: An automatic security testing tool for buffer overflow defect detection., , , , , and . Comput. Electr. Eng., 39 (7): 2233-2242 (2013)Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy., , , , , , and . Inf., 14 (10): 525 (2023)Hawkeye: Finding spamming accounts., , , , , and . APNOMS, page 1-4. IEEE, (2014)VRS: a values-based reputation system for web services., , , , , , , , and . Secur. Commun. Networks, 9 (18): 6335-6350 (2016)TransSQL: A Translation and Validation-Based Solution for SQL-injection Attacks., , , , , and . RVSP, page 248-251. IEEE Computer Society, (2011)Handover: A mechanism to improve the reliability and availability of network services for clients behind a network address translator., , , , , , and . Comput. Electr. Eng., (2018)DPC: A Dynamic Permission Control Mechanism for Android Third-Party Libraries., , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1751-1761 (2021)