Author of the publication

Hardening Web Applications against SQL Injection Attacks Using Anomaly Detection Approach.

, , and . IP&C, volume 313 of Advances in Intelligent Systems and Computing, page 285-292. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comprehensive Approach to Information Sharing for increased Network Security and Survivability.. Cybernetics and Systems, 44 (6-7): 550-568 (2013)Integrated color, texture and shape information for content-based image retrieval., , and . Pattern Anal. Appl., 10 (4): 333-343 (2007)Intersection Approach to Vulnerability Handling., , , and . WEBIST (1), page 171-174. INSTICC Press, (2010)Ear Biometrics.. Encyclopedia of Biometrics, Springer US, (2015)Recognizing Individual Typing Patterns., and . IbPRIA (2), volume 4478 of Lecture Notes in Computer Science, page 323-330. Springer, (2007)Image Filtration and Feature Extraction for Face Recognition., and . Biometrics, Computer Security Systems and Artificial Intelligence Applications, Springer, (2006)Symmetry-Based Salient Points Detection in Face Images., and . ICAISC, volume 4029 of Lecture Notes in Computer Science, page 758-767. Springer, (2006)Artificial Neural Network Hyperparameter Optimisation for Network Intrusion Detection., , and . ICIC (1), volume 11643 of Lecture Notes in Computer Science, page 749-760. Springer, (2019)Multimodal Hand-Palm Biometrics., and . ICANNGA (2), volume 4432 of Lecture Notes in Computer Science, page 407-414. Springer, (2007)Network Events Correlation for Federated Networks Protection System., , , , and . ServiceWave, volume 6994 of Lecture Notes in Computer Science, page 100-111. Springer, (2011)