Author of the publication

An Intensive Analysis of Security and Privacy Browser Add-Ons.

, , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 258-273. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

In Cloud We Trust: Risk-Assessment-as-a-Service., , and . IFIPTM, volume 401 of IFIP Advances in Information and Communication Technology, page 100-110. Springer, (2013)Evaluating the Manageability of Web Browsers Controls., , and . STM, volume 8203 of Lecture Notes in Computer Science, page 82-98. Springer, (2013)An Intensive Analysis of Security and Privacy Browser Add-Ons., , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 258-273. Springer, (2015)Return on Security Investment for Cloud Platforms., , and . CloudCom (2), page 132-137. IEEE Computer Society, (2013)978-0-7695-5095-4.Avoiding Network and Host Detection using Packet Bit-masking., , , , and . ICETE (2), page 52-63. ScitePress, (2020)Securing cloud and mobility: A practitioner's guide., and . Comput. Secur., (2014)Using side channel TCP features for real-time detection of malware connections., , , , and . J. Comput. Secur., 27 (5): 507-520 (2019)Exposing security and privacy liabilities in modern browsers. Athens University Economics and Business, Greece, (2017)National Archive of PhD Theses: oai:10442/40574.Mobile Devices - A Phisher's Paradise., , , and . SECRYPT, page 79-87. SciTePress, (2014)Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks., , , , and . ICETE (2), page 219-229. SciTePress, (2018)