Author of the publication

WebMTD: Defeating Web Code Injection Attacks using Web Element Attribute Mutation.

, and . MTD@CCS, page 17-26. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Permutational Sampling Technique for Cooperative Network Scanning., and . PST, page 1-6. IEEE, (2019)Insider Threat Mitigation Using Moving Target Defense and Deception., and . MIST@CCS, page 93-96. ACM, (2017)Toward practical defense against traffic analysis attacks on encrypted DNS traffic., , , and . Comput. Secur., (2023)An Accurate and Scalable Role Mining Algorithm based on Graph Embedding and Unsupervised Feature Learning., , , and . HICSS, page 1-10. ScholarSpace, (2020)HoneyBug: Personalized Cyber Deception for Web Applications., , , and . HICSS, page 1-10. ScholarSpace, (2020)A Deception Planning Framework for Cyber Defense., and . HICSS, page 1-10. ScholarSpace, (2020)MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization., and . Comput. Secur., (2023)CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment., , , and . CNS, page 1-9. IEEE, (2018)GTHBAC: A Generalized Temporal History Based Access Control Model., , , and . Telecommun. Syst., 45 (2-3): 111-125 (2010)Detecting Network Scanning Through Monitoring and Manipulation of DNS Traffic., , and . IEEE Access, (2023)