Author of the publication

Phishing Attacks Modifications and Evolutions.

, , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 243-262. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conformance Relations and Test Derivation., , and . Protocol Test Systems, volume C-19 of IFIP Transactions, page 157-178. North-Holland, (1993)On the Distributed Implementation of LOTOS., , and . FORTE, page 133-146. North-Holland, (1989)Protocol Synthesis for Real-Time Applications., , and . FORTE, volume 156 of IFIP Conference Proceedings, page 417-433. Kluwer, (1999)Hierarchical Inter-Domain Management for Networks with Condo-Switches.. Communication Systems and Applications, page 190-196. IASTED/ACTA Press, (2005)Methods for Designing SIP Features in SDL with Fewer Feature Interactions., and . FIW, page 59-76. IOS Press, (2003)Specification Languages for Communication Protocols.. CHDL, volume A-32 of IFIP Transactions, page 379-396. North-Holland, (1993)Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services., and . AIMS, volume 6734 of Lecture Notes in Computer Science, page 124-135. Springer, (2011)Using URL shorteners to compare phishing and malware attacks., , , , and . eCrime, page 1-13. IEEE, (2018)Some Experience with the Use of Formal Specifications., , , , , , , , and . PSTV, page 171-185. North-Holland, (1982)Deriving protocol specifications from service specifications written as Predicate/Transition-nets., , , and . Comput. Networks, 51 (1): 258-284 (2007)