Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IFrandbox - Client Side Protection from Malicious Injected Iframes., , and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 383-386. Springer, (2011)Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP., , and . InfoSecHiComNet, volume 7011 of Lecture Notes in Computer Science, page 3-15. Springer, (2011)Throttling DDoS Attacks using Discrete Logarithm Problem., , and . SECRYPT, page 263-269. SciTePress, (2010)A Novel Technique for Defeating Virtual Keyboards - Exploiting Insecure Features of Modern Browsers., , and . ACC (2), volume 191 of Communications in Computer and Information Science, page 685-692. Springer, (2011)An In-Depth Analysis of the Epitome of Online Stealth: Keyloggers; and Their Countermeasures., , and . ACC (3), volume 192 of Communications in Computer and Information Science, page 10-19. Springer, (2011)Attacks on Web Services and Mitigation Schemes., , and . SECRYPT, page 499-504. SciTePress, (2010)Throttling DDoS Attacks., , , , , and . SECRYPT, page 121-126. INSTICC Press, (2009)