Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Investigation on Non-Invasive Brain-Computer Interfaces: Emotiv Epoc+ Neuroheadset and Its Effectiveness., , and . CoRR, (2022)We Did It! So Can You! Creating "No-Textbook" IT Degrees., , , and . SIGITE, page 151-152. ACM, (2021)Digital Badges to Enhance Skills and Preparation for a Career in Cyber Security., , , , and . COMPSAC Workshops, page 622-623. IEEE Computer Society, (2016)978-1-4673-8845-0.OCL Fault Injection-Based Detection of LDAP Query Injection Vulnerabilities., , and . COMPSAC Workshops, page 455-460. IEEE Computer Society, (2016)978-1-4673-8845-0.Information Theoretic Anomaly Detection Framework for Web Application., , and . COMPSAC Workshops, page 394-399. IEEE Computer Society, (2016)978-1-4673-8845-0.Injecting Comments to Detect JavaScript Code Injection Attacks., and . COMPSAC Workshops, page 104-109. IEEE Computer Society, (2011)Mitigating distributed denial of service attacks at the application layer., , and . SAC, page 693-696. ACM, (2017)A Statistical Summary Analysis of Window-Based Extracted Features for EEG Signal Classification., , , and . ICDH, page 293-298. IEEE, (2021)Analyzing Security and Privacy Concerns of Contact Tracing Applications., , and . ICDH, page 283-292. IEEE, (2021)Framework for Collecting Data from specialized IoT devices - An application to enhance Healthcare Systems., , , , , and . ICDH, page 231-233. IEEE, (2021)