Author of the publication

Cryptojacking injection: A paradigm shift to cryptocurrency-based web-centric internet attacks.

, , and . J. Organ. Comput. Electron. Commer., 29 (1): 40-59 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reasoning crypto ransomware infection vectors with Bayesian networks., , and . ISI, page 149-151. IEEE, (2017)Accelerating and tuning small matrix multiplications on Sunway TaihuLight: A case study of spectral element CFD Code Nek5000., , , , , , and . Int. J. High Perform. Comput. Appl., (2020)Web Service Testing Tools: A Comparative Study., , , and . CoRR, (2013)Blockchain Framework for Healthcare Data Management System in Clinical Trials., , and . FSDM, volume 378 of Frontiers in Artificial Intelligence and Applications, page 824-832. IOS Press, (2023)A UAV-Assisted Authentication Protocol for Internet of Vehicles., , , , , and . IEEE Trans. Intell. Transp. Syst., 25 (8): 10286-10297 (August 2024)Using Network Processor to Establish Trustworthy Agent Scheme for AODV Routing Protocol., , , and . Wireless Personal Communications, 42 (1): 49-62 (2007)An overview: multiscale simulation in understanding the radiation damage accumulation of reactor materials., , , , , , , and . Simul., (2021)Velocity-Dependent Nearest Neighbor Query., , , , , and . APWeb/WAIM (2), volume 12859 of Lecture Notes in Computer Science, page 351-367. Springer, (2021)On Man-In-The-Cloud (MITC) attacks: The analytical case of Linux., and . ISI, page 170-172. IEEE, (2017)Range Nearest Neighbor Query with the Direction Constraint., , , , and . WISE Workshops, volume 1155 of Communications in Computer and Information Science, page 115-131. Springer, (2019)