Author of the publication

Moving Target Defense in Preventing SQL Injection.

, , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 25-34. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DACH: An Efficient and Reliable Way to Integrate WSN with IPv6., and . IJDSN, (2012)A Novel IDS Securing Industrial Control System of Critical Infrastructure Using Deception Technology., , and . Int. J. Digit. Crime Forensics, 14 (2): 1-20 (2022)Study on Active Defense of Honeypot-Based Industrial Control Network., and . HPCC/DSS/SmartCity/DependSys, page 2019-2022. IEEE, (2021)A Comparative Study of Two Different Spam Detection Methods., , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 95-105. Springer, (2019)Design and Implementation of Industrial Control Cyber Range System., , and . CyberC, page 166-170. IEEE, (2022)Moving Target Defense in Preventing SQL Injection., , , and . ICAIS (4), volume 11635 of Lecture Notes in Computer Science, page 25-34. Springer, (2019)A Machine Learning-Based Botnet Malicious Domain Detection Technique for New Business., , , and . ICPCSEE (2), volume 1880 of Communications in Computer and Information Science, page 191-201. Springer, (2023)A Web-Based Honeypot in IPv6 to Enhance Security., , , and . Inf., 11 (9): 440 (2020)A Novel Video-Surveillance-Based Algorithm of Fall Detection., , , and . CISP-BMEI, page 1-6. IEEE, (2018)Rethinking the Information Inside Documents for Sentiment Classification., , , , and . KSEM, volume 12815 of Lecture Notes in Computer Science, page 421-432. Springer, (2021)