Author of the publication

A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities for Greater Harm.

, , , , and . NSysS, page 93-101. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding fraudulence in online qualitative studies: From the researcher's perspective., , , , , , , , and . CHI, page 824:1-824:17. ACM, (2024)Forms of Fraudulence in Human-Centered Design: Collective Strategies and Future Agenda for Qualitative HCI Research., , , , , , , and . CHI Extended Abstracts, page 469:1-469:5. ACM, (2024)"I hope I never need one": Unpacking Stigma in Aging in Place Technology., , and . CHI, page 264:1-264:12. ACM, (2022)Older Adults' Experiences of Autonomy During COVID-19 Pandemic., , and . CHI Extended Abstracts, page 250:1-250:6. ACM, (2021)Conjugate Congestion Control Based Transport Layer Protocol for Molecular Communication in Body Area Nanonetworks (BANs)., , , , and . NSysS, page 152-157. IEEE, (2018)General-purpose multi-objective vertical hand-off mechanism exploiting network dynamics., , , , , and . WiMob, page 825-832. IEEE Computer Society, (2015)Pro-AODV (Proactive AODV): Simple modifications to AODV for proactively minimizing congestion in VANETs., , and . NSysS, page 1-6. IEEE, (2015)FGPGA: An Efficient Genetic Approach for Producing Feasible Graph Partitions., , , and . CoRR, (2014)Prottasha: An Attempt to Help the Women Fighting Ovarian Cancer in Rural Areas of Bangladesh., , , and . ACM DEV, page 38:1-38:4. ACM, (2016)Network-level performance enhancement in wireless nanosensor networks through multi-layer modifications., , and . NSysS, page 75-83. IEEE, (2017)