Personensuche
X
?
Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies ,
2
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks:
, In:
?
Advances in Internet, Data & Web Technologies; Lecture Notes on Data Engineering and Communications Technologies ,
5
Monitoring Power Usage Effectiveness to Detect Cooling Syst..:
, In:
?
2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) ,
7
Semi-Automatic PenTest Methodology based on Threat-Model: T..:
, In:
?
Computational Science and Its Applications – ICCSA 2023 Workshops; Lecture Notes in Computer Science ,
9
Mitigating User Exposure to Dark Patterns in Cookie Banners..:
, In:
?
Computational Science and Its Applications – ICCSA 2023 Workshops; Lecture Notes in Computer Science ,
11
An Association Rules-Based Approach for Anomaly Detection o..:
, In:
?
2023 24th International Conference on Control Systems and Computer Science (CSCS) ,
12
Privacy risk analysis and metrics in capturing and storing ..:
, In:
?
Intelligent Distributed Computing XIV; Studies in Computational Intelligence ,
13
Intelligent Agents for Diffused Cyber-Physical Museums:
, In:
?
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) ,
14