Author of the publication

An Experimental and Industrial Experience: Avoiding Denial of Service via Memory Profiling.

, , and . AICCSA, page 151-158. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bypassing Security Toolbars and Phishing Filters via DNS Poisoning., and . GLOBECOM, page 2001-2006. IEEE, (2008)Integrating Privacy Requirements into Security Requirements Engineering., , and . SEKE, page 542-547. Knowledge Systems Institute Graduate School, (2009)Cyber security of networked critical infrastructures Guest Editorial., , , , and . IEEE Netw., 27 (1): 3-4 (2013)Circumventing security toolbars and phishing filters via rogue wireless access points., and . Wirel. Commun. Mob. Comput., 10 (8): 1128-1139 (2010)A comparison of machine learning techniques for phishing detection., , , and . eCrime Researchers Summit, volume 269 of ACM International Conference Proceeding Series, page 60-69. ACM, (2007)A distributed architecture for phishing detection using Bayesian Additive Regression Trees., , , and . eCrime, page 1-10. IEEE, (2008)Avoiding Denial of Service via Stress Testing., , and . AICCSA, page 300-307. IEEE Computer Society, (2006)Malicious and Spam Posts in Online Social Networks., , and . Computer, 44 (9): 23-28 (2011)Lessons from Stuxnet., and . Computer, 44 (4): 91-93 (2011)Bayesian Additive Regression Trees-Based Spam Detection for Enhanced Email Privacy., , , and . ARES, page 1044-1051. IEEE Computer Society, (2008)