Author:
Shahriar Hossain,Weldemariam Komminist,Zulkernine Mohammad,Lutellier Thibaud
Funder
Natural Sciences and Engineering Research Council of Canada
Kennesaw State University College of Science
Mathematics Faculty Summer Research Award Program (USA)
Subject
Law,General Computer Science
Reference52 articles.
1. Efficacy of hidden Markov models over neural networks in anomaly intrusion detection;Al-Subaie,2006
2. Vetting browser extensions for security vulnerabilities with VEX;Bandhakavi;Commun ACM,2011
3. Protecting browsers from extension vulnerabilities;Barth,2010
4. Protecting web browser extensions from JavaScript injection attacks;Barua,2013
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献