Author of the publication

Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures

. International Journal of Computer Networks & Communications (IJCNC), (November 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Obstacles to Implementation of Information Security Governance., and . TrustCom/BigDataSE, page 1826-1831. IEEE, (2018)IT Security Assessment for Interdisciplinary Research., , and . WiMo, volume 84 of Communications in Computer and Information Science, page 356-366. (2010)OAuth-SSO: A Framework to Secure the OAuth-Based SSO Service for Packaged Web Applications., , , , and . TrustCom/BigDataSE, page 1575-1578. IEEE, (2018)Discovering New Cyber Protection Approaches from a Security Professional Prospective, and . International Journal of Computer Networks & Communications (IJCNC), 9 (4): 13-25 (July 2017)Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures. International Journal of Computer Networks & Communications (IJCNC), (November 2024)Intelligent Network Applications for Medical Systems., and . WiMo, volume 84 of Communications in Computer and Information Science, page 409-416. (2010)An exploratory analysis of the influence of information security on the adoption of cloud computing., and . SoSE, page 165-170. IEEE, (2013)Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered Environment., and . TrustCom/BigDataSE, page 1955-1962. IEEE, (2018)A Synopsis of "The Impact of Motivation, Price, and Habit on Intention to Use IoT-Enabled Technology: A Correlational Study"., and . J. Cybersecur. Priv., 2 (3): 662-699 (August 2022)Identifying Influences to Information Security Framework Adoption: Applying a Modified UTAUT., and . IEEE BigData, page 2605-2609. IEEE, (2020)