Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Server-Side Bot Detection in Massively Multiplayer Online Games., , , and . IEEE Secur. Priv., 7 (3): 29-36 (2009)Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries., , , , , and . J. Comput. Secur., 17 (3): 305-329 (2009)Static analysis for detecting taint-style vulnerabilities in web applications., , and . J. Comput. Secur., 18 (5): 861-907 (2010)Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters., , , , , and . RAID, volume 8145 of Lecture Notes in Computer Science, page 369-389. Springer, (2013)Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists., , , , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 255-276. Springer, (2019)Extending .NET Security to Unmanaged Code., , , and . ISC, volume 4176 of Lecture Notes in Computer Science, page 1-16. Springer, (2006)XGuide - A Practical Guide to XML-Based Web Engineering., , and . NETWORKING Workshops, volume 2376 of Lecture Notes in Computer Science, page 104-117. Springer, (2002)Securing Legacy Firefox Extensions with SENTINEL., , , and . DIMVA, volume 7967 of Lecture Notes in Computer Science, page 122-138. Springer, (2013)On the Effectiveness of Techniques to Detect Phishing Sites., , , and . DIMVA, volume 4579 of Lecture Notes in Computer Science, page 20-39. Springer, (2007)Reverse Social Engineering Attacks in Online Social Networks., , , , and . DIMVA, volume 6739 of Lecture Notes in Computer Science, page 55-74. Springer, (2011)