publication venue for
- USING SNORT IN SQL INJECTION ATTACKS. 14:37-46. 2020
- A Case Study on Converged Security with Event Correlation of Physical and Information Security. 9:77-94. 2015
- Approaches for Testing and Evaluation of XACML Policies. 8:101-111. 2014
- Efficient Assessment and Evaluation for Websites Vulnerabilities Using SNORT. 7:7-16. 2013