14 results on '"Merve Sahin"'
Search Results
2. The Hitchhiker's Guide to Malicious Third-Party Dependencies.
3. Simulating Deception for Web Applications Using Reinforcement Learning.
4. An Approach to Generate Realistic HTTP Parameters for Application Layer Deception.
5. Measuring Developers' Web Security Awareness from Attack and Defense Perspectives.
6. The Hitchhiker's Guide to Malicious Third-Party Dependencies.
7. A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence.
8. Molecular Communication Theoretical Modeling and Analysis of SARS-CoV2 Transmission in Human Respiratory System.
9. Understanding and Detecting International Revenue Share Fraud.
10. SoK: Fraud in Telephony Networks.
11. Using chatbots against voice spam: Analyzing Lenny's effectiveness.
12. Lenny the bot as a resource for sequential analysis: exploring the treatment of Next Turn Repair Initiation in the beginnings of unsolicited calls.
13. Over-The-Top Bypass: Study of a Recent Telephony Fraud.
14. Dynamic key ring update mechanism for Mobile Wireless Sensor Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.