Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Systematic Literature Review on the Characteristics and Effectiveness of Web Application Vulnerability Scanners., and . IEEE Access, (2022)Hidden Implementation Dependencies in High Assurance and Critical Computing Systems., and . IEEE Trans. Software Eng., 32 (10): 790-811 (2006)Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning., , , , , , and . IWCMC, page 219-225. IEEE, (2018)Security management of cyber physical control systems using NIST SP 800-82r2., , , , and . IWCMC, page 1864-1870. IEEE, (2017)An Architecture for a Policy-Oriented Web Browser Management System: HiFiPol: Browser., and . COMPSAC Workshops, page 382-387. IEEE Computer Society, (2016)978-1-4673-8845-0.Using a knowledge-based security orchestration tool to reduce the risk of browser compromise., , , and . SSCI, page 1-8. IEEE, (2016)Requirements are the New Code., and . COMPSAC, page 691-694. IEEE Computer Society, (2016)The Healthcare IoT Ecosystem: Advantages of Fog Computing Near the Edge., and . CHASE, page 51-56. ACM / IEEE, (2018)Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities., and . BigDataSecurity/HPSC/IDS, page 102-106. IEEE, (2023)Formal Verification and Visualization of Security Policies., , and . J. Comput., 3 (6): 22-31 (2008)