Author of the publication

Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications.

, , , and . DASC/PiCom/CBDCom/CyberSciTech, page 916-920. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of Big Data dimensions vs Social Networks analysis., , and . J. Intell. Inf. Syst., 57 (1): 73-100 (2021)Modeling and efficiently detecting security-critical sequences of actions., , , and . Future Gener. Comput. Syst., (2020)Model aggregation techniques in federated learning: A comprehensive survey., , , , , and . Future Gener. Comput. Syst., (January 2024)FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples., , , and . Inf. Fusion, (2023)Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone., , , , , , , , and . Checkmate@CCS, page 43-57. ACM, (2021)Explaining Binary Obfuscation., , , and . CSR, page 22-27. IEEE, (2023)Trusted Volunteer Computing., and . SEBD, volume 2037 of CEUR Workshop Proceedings, page 73. CEUR-WS.org, (2017)Enabling Faster Security Assessment of Re-hosted Firmware., , , and . DASC/PiCom/CBDCom/CyberSciTech, page 1-6. IEEE, (2022)Efficient Big Data Clustering., , , and . IDEAS, page 103-109. ACM, (2018)Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities., , , , , and . Internet Things, (December 2023)