Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ConvertView - A Tool for Conversion and Visualization of Open Heterogenic Governmental Data to the RDF Standard., , , and . WEBIST, page 253-258. SciTePress, (2015)A File Recommendation Model For Cloud Storage Systems., , , , , and . SBSI, page 111-118. ACM, (2015)A cloud-based recommendation model., , , , , and . EATIS, page 23:1-23:4. ACM, (2014)Towards a taxonomy for security threats on the web ecosystem., , , , , , , , , and . NOMS, page 584-590. IEEE, (2016)Aegis: A Lightweight Tool for Prevent Frauds in Web Browsers., , , and . JISIC, page 1-8. IEEE, (2014)SafeMash - A Platform for Safety Mashup Composition., , , and . WEBIST (2), page 27-32. SciTePress, (2014)Security Threats in Cloud Computing Models: Domains and Proposals., , , , , and . IEEE CLOUD, page 383-389. IEEE Computer Society, (2013)Heuristic-based strategy for Phishing prediction: A survey of URL-based approach., , and . Comput. Secur., (2020)CatchPhish: Model for detecting homographic attacks on phishing pages., , , and . IJCNN, page 1-8. IEEE, (2022)A meta-analysis for security threats over the Web ecosystem., , , , , , , , and . NOMS, page 838-842. IEEE, (2016)