Author of the publication

How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints.

, , , and . ACM Trans. Priv. Secur., 19 (1): 2:1-2:31 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The information furnace: consolidated home control.. Personal and Ubiquitous Computing, 7 (1): 53-69 (2003)User interface evaluation of interactive TV: a media studies perspective, and . Universal Access in the Information Society, 5 (2): 209--218 (May 2006)Analysis and Design of Discrete Part Production Lines., , , and . Optimization and its applications Springer, (2009)Trial Evaluation of Wireless Info-communication and Indoor Location-Based Services in Exhibition Shows., , and . Panhellenic Conference on Informatics, volume 3746 of Lecture Notes in Computer Science, page 199-210. Springer, (2005)A PRoactive malware identification system based on the computer hygiene principles., and . Inf. Manag. Comput. Secur., 15 (4): 295-312 (2007)Version control systems. IEEE Software, 22 (5): 108--109 (September 2005)The Antikythera Mechanism: A Computer Science Perspective.. Computer, 41 (5): 22-27 (2008)Explore, Excogitate, Exploit: Component Mining.. Computer, 32 (9): 114-116 (1999)Dear Editor.. IEEE Software, 22 (2): 14-15 (2005)Bookshelf., , , , and . IEEE Software, 22 (1): 94-97 (2005)