Author of the publication

Web Navigation Sequences Automation in Modern Websites.

, , , , and . DEXA, volume 5690 of Lecture Notes in Computer Science, page 302-316. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Whole exome sequencing analysis pipeline for the discovery of mutations causative of human rare diseases., , , , , , , , , and 1 other author(s). IWBBIO, page 253-254. Copicentro Editorial, (2013)Modeling and Simulation of Upper Brachial Plexus Injury., , , , , and . IEEE Syst. J., 10 (3): 912-921 (2016)IoT-Forensics Meets Privacy: Towards Cooperative Digital Investigations., , and . Sensors, 18 (2): 492 (2018)Security assurance during the software development cycle., , and . CompSysTech, page 20. ACM, (2009)Modelling trust dynamics in the Internet of Things., , and . Inf. Sci., (2017)Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN., , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 163-180. Springer, (2012)Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication., , , and . CANS, volume 4856 of Lecture Notes in Computer Science, page 265-281. Springer, (2007)Modeling Malware-driven Honeypots., , and . TrustBus, volume 10442 of Lecture Notes in Computer Science, page 130-144. Springer, (2017)Distributed Storage and Revocation in Digital Certificate Databases., , , and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 929-938. Springer, (2000)A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI., , , and . ISC, volume 2433 of Lecture Notes in Computer Science, page 136-149. Springer, (2002)