From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Information Theoretic XSS Attack Detection in Web Applications., , , и . Int. J. Secur. Softw. Eng., 5 (3): 1-15 (2014)Client-Side Detection of Clickjacking Attacks., и . Int. J. Inf. Secur. Priv., 9 (1): 1-25 (2015)Assessing HIPAA Compliance of Open Source Electronic Health Record Applications., , и . Int. J. Inf. Secur. Priv., 15 (2): 181-195 (2021)Toward a Secure and Decentralized Blockchain-based Ride-Hailing Platform for Autonomous Vehicles., , и . CoRR, (2019)Malware Detection and Prevention using Artificial Intelligence Techniques., , , , , , , , , и 1 other автор(ы). CoRR, (2022)Smart Connected Aircraft: Towards Security, Privacy, and Ethical Hacking., , , , , , и . SIN, стр. 1-5. IEEE, (2021)Towards Unsupervised Learning based Denoising of Cyber Physical System Data to Mitigate Security Concerns., и . CNS, стр. 1-6. IEEE, (2022)R-Mon: An mhealth Tool for Real-time Respiratory Monitoring During Pandemics and Self-Isolation., , и . SERVICES, стр. 17-21. IEEE, (2020)Labware for networking protocols and wireless security using Android-enabled mobile devices., , , , и . ACM Southeast Regional Conference, стр. 13:1-13:6. ACM, (2014)CS++: expanding CS curriculum via open cybersecurity courseware., , , , , и . ACM Southeast Regional Conference, стр. 24:1-24:7. ACM, (2014)