Now showing items 1-2 of 2

    • Securing legacy firefox extensions with SENTINEL 

      Onarlıoğu, K.; Battal, Mustafa; Robertson, W.; Kırda, E. (Springer, 2013-07)
      A poorly designed web browser extension with a security vulnerability may expose the whole system to an attacker. Therefore, attacks directed at "benign-but-buggy" extensions, as well as extensions that have been written ...
    • A survey on information security threats and solutions for Machine to Machine (M2M) communications 

      Tuna, G.; Kogias, D. G.; Gungor, V. C.; Gezer, C.; Taşkın, E.; Ayday, E. (Academic Press Inc., 2017)
      Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ...