Author of the publication

PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks.

, , and . NCA, page 198-203. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

nSwitching: Virtual Machine aware relay hardware switching to improve intra-NIC Virtual Machine traffic., and . ICC, page 2700-2705. IEEE, (2012)iCAPTCHA: The Next Generation of CAPTCHA Designed to Defend against 3rd Party Human Attacks., , and . ICC, page 1-6. IEEE, (2011)Harnessing the power of BitTorrent for distributed denial-of-service attacks., , , and . Secur. Commun. Networks, 4 (8): 860-870 (2011)Monitoring and early warning for internet worms., , , and . ACM Conference on Computer and Communications Security, page 190-199. ACM, (2003)Modeling Botnet Propagation Using Time Zones., , and . NDSS, The Internet Society, (2006)Image Authentication Using Self-Supervised Learning to Detect Manipulation Over Social Network Platforms., , , , and . MILCOM, page 672-678. IEEE, (2022)Pervasive Internet Access by Vehicles through Satellite Receive-Only Terminals., , and . ICCCN, page 1-6. IEEE Computer Society, (2009)PwdIP-Hash: A Lightweight Solution to Phishing and Pharming Attacks., , and . NCA, page 198-203. IEEE Computer Society, (2010)Wi-Fi access denial of service attack to smartphones., , and . Int. J. Secur. Networks, 8 (3): 117-129 (2013)Extension of internet access to VANET via satellite receive-only terminals., , and . Int. J. Ad Hoc Ubiquitous Comput., 14 (3): 172-190 (2013)