From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reverse Social Engineering Attacks in Online Social Networks., , , , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 55-74. Springer, (2011)Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists., , , , и . ISC, том 11723 из Lecture Notes in Computer Science, стр. 255-276. Springer, (2019)Extending .NET Security to Unmanaged Code., , , и . ISC, том 4176 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2006)Securing Legacy Firefox Extensions with SENTINEL., , , и . DIMVA, том 7967 из Lecture Notes in Computer Science, стр. 122-138. Springer, (2013)On the Effectiveness of Techniques to Detect Phishing Sites., , , и . DIMVA, том 4579 из Lecture Notes in Computer Science, стр. 20-39. Springer, (2007)Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters., , , , , и . RAID, том 8145 из Lecture Notes in Computer Science, стр. 369-389. Springer, (2013)Server-Side Bot Detection in Massively Multiplayer Online Games., , , и . IEEE Secur. Priv., 7 (3): 29-36 (2009)OAuth 2.0 Redirect URI Validation Falls Short, Literally., , , , , и . ACSAC, стр. 256-267. ACM, (2023)The Evolution of an Organizational Web Site: Migrating to XML/XSL., , , , и . WSE, стр. 62-69. IEEE Computer Society, (2001)FIRE: FInding Rogue nEtworks., , , , и . ACSAC, стр. 231-240. IEEE Computer Society, (2009)