Securing legacy firefox extensions with SENTINEL
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Please cite this item using this persistent URLhttp://hdl.handle.net/11693/27988
- Conference Paper 
Showing items related by title, author, creator and subject.
Battal, Mustafa (Bilkent University, 2014)A poorly designed web browser extension with a security vulnerability may expose the whole system to an attacker. Therefore, attacks directed at “benign-butbuggy” extensions, as well as extensions that have been written ...
A survey on information security threats and solutions for Machine to Machine (M2M) communications Tuna G.; Kogias D.G.; Gungor V.C.; Gezer C.; Taşkın E.; Ayday E. (Academic Press Inc., 2017)Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ...
Dilek, A.; Belviranli, M.E.; Dogrusoz, U. (2010)With recent advancements in techniques for cellular data acquisition, information on cellular processes has been increasing at a dramatic rate. Visualization is critical to analyzing and interpreting complex information; ...