Author of the publication

Study on Diffusion of Protection/Mitigation against Memory Corruption Attack in Linux Distributions.

, , , , and . IMIS, page 525-530. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proposal and Implementation of a Countermeasure Against Event Tracking on the Web., , , , , , , and . IMIS, volume 612 of Advances in Intelligent Systems and Computing, page 435-444. Springer, (2017)Recursive-Rule Extraction Algorithm With J48graft And Applications To Generating Credit Scores., , , , , , , and . J. Artif. Intell. Soft Comput. Res., 6 (1): 35 (2016)Examination and Comparison of Countermeasures Against Web Tracking Technologies., and . IMIS, volume 994 of Advances in Intelligent Systems and Computing, page 477-489. Springer, (2019)Aspects of Evolutionary Construction of New Flexible PID-fuzzy Controller., , and . ICAISC (1), volume 9692 of Lecture Notes in Computer Science, page 450-464. Springer, (2016)A privacy-enhanced access control., , and . Syst. Comput. Jpn., 37 (5): 77-86 (2006)Web Browser Fingerprinting Using Only Cascading Style Sheets., , , and . BWCCA, page 57-63. IEEE Computer Society, (2015)A Survey of Hardware Features in Modern Browsers: 2015 Edition., , , and . IMIS, page 520-524. IEEE Computer Society, (2015)Incremental Analysis and Verification of Authentication Protocols., , and . WETICE, page 192-193. IEEE Computer Society, (1999)The Secure DHCP System with User Authentication., and . LCN, page 123-131. IEEE Computer Society, (2002)Security Authorization Scheme for Web Applications., , , and . NBiS, page 250-256. IEEE Computer Society, (2015)