Author of the publication

A Structured Analysis of SQL Injection Runtime Mitigation Techniques.

, , and . HICSS, page 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MAHIVE: Modular Analysis Hierarchical Intrusion Detection System Visualization Event Cybersecurity Engine for Cyber-Physical Systems and Internet of Things Devices., , and . HICSS, page 1-9. ScholarSpace, (2021)HESPIDS: A Hierarchical and Extensible System for Process Injection Detection using Sysmon., , and . HICSS, page 1-10. ScholarSpace, (2022)Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations., , , and . HICSS, page 6055-6057. ScholarSpace, (2023)HERMES: A high-level policy language for high-granularity enterprise-wide secure browser configuration management., , , and . SSCI, page 1-9. IEEE, (2016)Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Operations., , , and . HICSS, page 1-3. ScholarSpace, (2022)Introduction to the Minitrack on Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security., , , and . HICSS, page 1-3. ScholarSpace, (2021)A Structured Analysis of SQL Injection Runtime Mitigation Techniques., , and . HICSS, page 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2017)Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers., , , , and . DASC/PiCom/DataCom/CyberSciTech, page 687-692. IEEE Computer Society, (2017)Evaluating the Use of Security Tags in Security Policy Enforcement Mechanisms., , , , and . HICSS, page 5201-5210. IEEE Computer Society, (2015)Analysis of Web Browser Security Configuration Options., , , and . KSII Trans. Internet Inf. Syst., 12 (12): 6139-6160 (2018)