Author of the publication

BISSAM: Automatic Vulnerability Identification of Office Documents.

, , and . DIMVA, volume 7591 of Lecture Notes in Computer Science, page 204-213. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A coherent amplify-and-forward relaying demonstrator without global phase reference., and . PIMRC, page 1-5. IEEE, (2008)Mobile Portals for Knowledge Management., , and . Encyclopedia of Portal Technologies and Applications, IGI Global, (2007)Optimizing Zero-Forcing Based Gain Allocation for Wireless Multiuser Networks., , and . ICC, page 5825-5830. IEEE, (2007)Security intelligence for cloud management infrastructures., , , , , , , , and . IBM Journal of Research and Development, 60 (4): 11 (2016)Einsatz eines Sicherheitsmusters zur Absicherung einer mobilen Wissensmanagementlösung., and . DFN-Arbeitstagung über Kommunikationsnetze, volume P-44 of LNI, page 195-215. GI, (2003)Metamodel-Based Information Integration at Industrial Scale., , , and . MoDELS (2), volume 6395 of Lecture Notes in Computer Science, page 153-167. Springer, (2010)Ubiquitous computing using SIP., , , and . NOSSDAV, page 82-89. ACM, (2003)Trustworthy and personalized computing on public kiosks., , , , , and . MobiSys, page 199-210. ACM, (2008)U-Know - Ubiquitäres Wissensmanagement an der Universität Regensburg., and . ISI, volume 40 of Schriften zur Informationswissenschaft, page 107-122. Hochschulverband für Informationswissenschaft, (2002)Location-Based Services in the Tourist Industry., , and . J. of IT & Tourism, 5 (4): 243-256 (2002)