Author of the publication

Systematic Website Verification for Privacy Protection.

, , , , , and . IAS, page 231-234. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality measurement of production process plan using tolerance chart., and . CASE, page 25-30. IEEE, (2005)Feasibility Study of the Electromagnetic Damper for Cable Structures Using Real-Time Hybrid Simulation., , and . Sensors, 17 (11): 2499 (2017)Systematic Website Verification for Privacy Protection., , , , , and . IAS, page 231-234. IEEE Computer Society, (2008)Method for Evaluating the Security Risk of a Website Against Phishing Attacks., , , , , and . ISI Workshops, volume 5075 of Lecture Notes in Computer Science, page 21-31. Springer, (2008)CoDocs: An electronic document management system supporting effective collaborative work., , , , and . HCI (2), page 593-597. Lawrence Erlbaum, (1999)Implementation of application-specific DSP for OFDM systems., , , , , and . ISCAS (3), page 665-658. IEEE, (2004)Information Privacy Engineering in ubiComp., , and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 628-634. Springer, (2005)Production Information Monitoring System for CIM in Footwear Industry.. J. Inform. and Commun. Convergence Engineering, 7 (4): 459-464 (2009)Application of Crack Identification Techniques for an Aging Concrete Bridge Inspection Using an Unmanned Aerial Vehicle., , , , and . Sensors, 18 (6): 1881 (2018)Direct causal mechanisms of profit: dominant paradigm of profit seeking., and . Technol. Anal. Strateg. Manag., 31 (4): 371-387 (2019)