From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SecuBat: a web vulnerability scanner., , , и . WWW, стр. 247-256. ACM, (2006)Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists., , , , и . ISC, том 11723 из Lecture Notes in Computer Science, стр. 255-276. Springer, (2019)Extending .NET Security to Unmanaged Code., , , и . ISC, том 4176 из Lecture Notes in Computer Science, стр. 1-16. Springer, (2006)Reverse Social Engineering Attacks in Online Social Networks., , , , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 55-74. Springer, (2011)Server-Side Bot Detection in Massively Multiplayer Online Games., , , и . IEEE Secur. Priv., 7 (3): 29-36 (2009)Static analysis for detecting taint-style vulnerabilities in web applications., , и . J. Comput. Secur., 18 (5): 861-907 (2010)Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries., , , , , и . J. Comput. Secur., 17 (3): 305-329 (2009)SoK: Cryptojacking Malware., , , , и . EuroS&P, стр. 120-139. IEEE, (2021)Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications., , , , , , и . SP, стр. 387-401. IEEE Computer Society, (2008)Honeybot, Your Man in the Middle for Automated Social Engineering., , , и . LEET, USENIX Association, (2010)