Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ConvertView - A Tool for Conversion and Visualization of Open Heterogenic Governmental Data to the RDF Standard., , , and . WEBIST, page 253-258. SciTePress, (2015)A File Recommendation Model For Cloud Storage Systems., , , , , and . SBSI, page 111-118. ACM, (2015)Towards a taxonomy for security threats on the web ecosystem., , , , , , , , , and . NOMS, page 584-590. IEEE, (2016)A cloud-based recommendation model., , , , , and . EATIS, page 23:1-23:4. ACM, (2014)Heuristic-based strategy for Phishing prediction: A survey of URL-based approach., , and . Comput. Secur., (2020)CatchPhish: Model for detecting homographic attacks on phishing pages., , , and . IJCNN, page 1-8. IEEE, (2022)A Privacy Maturity Model for Cloud Storage Services., , , , , , , and . IEEE CLOUD, page 944-945. IEEE Computer Society, (2014)A meta-analysis for security threats over the Web ecosystem., , , , , , , , and . NOMS, page 838-842. IEEE, (2016)SafeMash - A Platform for Safety Mashup Composition., , , and . WEBIST (2), page 27-32. SciTePress, (2014)Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers., , , and . JISIC, page 1-8. IEEE, (2014)