Search for persons
X
?
Advanced Information Networking and Applications; Lecture Notes on Data Engineering and Communications Technologies ,
2
XSS-Unearth: A Tool for Forensics Analysis of XSS Attacks:
, In:
?
Advances in Internet, Data & Web Technologies; Lecture Notes on Data Engineering and Communications Technologies ,
4
Monitoring Power Usage Effectiveness to Detect Cooling Syst..:
, In:
?
2023 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) ,
8
Semi-Automatic PenTest Methodology based on Threat-Model: T..:
, In:
?
Computational Science and Its Applications – ICCSA 2023 Workshops; Lecture Notes in Computer Science ,
9
An Association Rules-Based Approach for Anomaly Detection o..:
, In:
?
2023 24th International Conference on Control Systems and Computer Science (CSCS) ,
10
Privacy risk analysis and metrics in capturing and storing ..:
, In:
?
Computational Science and Its Applications – ICCSA 2023 Workshops; Lecture Notes in Computer Science ,
12
Mitigating User Exposure to Dark Patterns in Cookie Banners..:
, In:
?
2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) ,
13
Federated and Generative Data Sharing for Data-Driven Secur..:
, In:
?
Intelligent Distributed Computing XIV; Studies in Computational Intelligence ,
14