Conference Articles 2009(1 publication) [publication]Seixas, N. and José Fonseca and Marco Vieira and Madeira, H. , "Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study", in 20th annual International Symposium on Software Reliability Engineering, 2009 [citation][year=2012]M. Murali, R. Srinivasan, "Inter-domain Authentication Scheme in a Distributed Mobile Netwrok, Journal of Informattion Technology, ISSN: 1815-7432, 2012. [citation][year=2012]Theodoor Scholte, Davide Balzarotti, William Robertson, Engin Kirda, "An Empirical Analysis of Input Validation Mechanisms in Web Applications and Languages", 27th ACM Symposium On Applied Computing (SAC 2012), Trento, Italy, March 2012. [citation][year=2012]Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan, "A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies", CustomWare & International Islamic University Malaysia, Kuala Lumpur, Malaysia, 2012. [citation][year=2011]5. Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan, “A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques”, The 15th IEEE Symposium on Consumer Electronics, IEEE ISCE2011, Singapore, June, 2011. [citation][year=2011]1. Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]2. Lai-Cheng Cao, “Secure Negotiation Approach for Share-Secret-Key of Kerberos Service”, Artificial Intelligence and Computational Intelligence”, pp 101-107, Springer Berlin / Heidelberg, ISBN 978-3-642-23886-4, September, 2011. [citation][year=2011]3. Dimitris Mitropoulos, Vassilios Karakoidas, Panagiotis Louridas, Diomidis Spinellis, “Countering code injection attacks: A unified approach”, Information Management and Computer Security, 19(3), ISSN: 0968-5227, Emerald Journals, 2011. [citation][year=2011]4. Lai-Cheng Cao, “Secure Secret-Key Management of Kerberos Service”, Emerging Research in Artificial Intelligence and Computational Intelligence, pp 76-83, September, 2011. [citation][year=2010]1. Deepak D. J., “Protection Against Input Manipulation Vulnerabilities in Service Oriented Architecture”, MSc Thesis – Master of Technology in Computer Science & Engineering – Information Security, Department of Computer Engineering - National Institute of Technology Karnataka, Mangalore, India, July 2010. [citation][year=2010]2. C. Lai-Cheng, “Enhancing Distributed Web Security Based on Kerberos Authentication Service”, Web Information Systems and Mining, F. Wang, Z. Gong, X. Luo, and J. Lei, eds., Springer Berlin / Heidelberg, pp. 171-178, 2010. 2005(1 publication) [publication]Seixas, N. and Pereira, H. and P. Carvalho and Henriques, J. and Antunes, M. , "A Low Bandwidth Solution for Telemedicine Application Event Synchronisation using JMF", in 3rd European Medical & Biological Engineering Conference, 2005 Book Chapters 2006(1 publication) [publication]Pereira, H. and P. Carvalho and Henriques, J. and Seixas, N. and Brito, M. and Palrinhas, F. , "SVG as a Basis for HCI in Heterogeneous eHealth Systems", in Smart Homes and Beyond, vol. 19, 2006 [citation][year=2010]• Raymond R. Bond, Dewar D. Finlay, Chris D. Nugent DPhil, George Moore,, A Web-based tool for processing and visualizing body surface potential maps, Journal of Electrocardiology, Volume 43, Issue 6, Pages 560-565, 2010