On the detection of privacy and security anomalies

Files in this item

This item appears in the following Collection(s)

© 2020, Muhammad Imran Khan. Except where otherwise noted, this item's license is described as © 2020, Muhammad Imran Khan.
This website uses cookies. By using this website, you consent to the use of cookies in accordance with the UCC Privacy and Cookies Statement. For more information about cookies and how you can disable them, visit our Privacy and Cookies statement