Author of the publication

A social approach to security: Using social networks to help detect malicious web content.

, , and . ISKE, page 436-441. IEEE, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Attacks And Defenses In Sensor Networks., , and . Security and Management, page 286-292. CSREA Press, (2010)Forensic course development: one year later., , and . SIGITE Conference, page 50-55. ACM, (2004)A Comparative Study and Simulation of Object Tracking Algorithms., , , , and . ICVIP, page 161-167. ACM, (2020)Services for deploying web-based online courses.. SOLI, page 311-316. IEEE, (2009)A hybrid Multi Meshed Tree routing protocol for wireless ad hoc networks., , , , and . MASS, page 635-640. IEEE Computer Society, (2008)Security auditing course development.. SIGITE Conference, page 259-266. ACM, (2007)Quality of service in Internet MANETs., , and . PIMRC, page 1823-1829. IEEE, (2005)Multi-meshed tree routing for Internet MANETs., and . ISWCS, page 145-149. IEEE, (2005)They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization., , , and . ESORICS (2), volume 12309 of Lecture Notes in Computer Science, page 439-459. Springer, (2020)Game-based forensics course for first year students., , , , and . SIGITE Conference, page 13-18. ACM, (2012)