关注
Krishna Chaitanya Telikicherla
Krishna Chaitanya Telikicherla
Principal Security Engineer, Microsoft
在 microsoft.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
System and method to detect online privacy violation
NS Chauhan, A Saxena, KC Telikicherla
US Patent 9,934,542, 2018
122018
CORP: a browser policy to mitigate web infiltration attacks
KC Telikicherla, V Choppella, B Bezawada
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
102014
Enabling the development of safer mashups for open data
KC Telikicherla, V Choppella
Proceedings of the 1st International Workshop on Inclusive Web Programming …, 2014
72014
Mitigating browser-based DDoS attacks using CORP
A Agrawall, K Chaitanya, AK Agrawal, V Choppella
Proceedings of the 10th Innovations in Software Engineering Conference, 137-146, 2017
52017
Method and system to identify key logging activities
A Saxena, HKB Ponnapalli, KC Telikicherla
US Patent App. 14/493,648, 2015
52015
A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP.
KC Telikicherla, A Agrawall, V Choppella
ICISSP, 516-523, 2017
32017
Alloy model for cross origin request policy (corp)
KC Telikicherla, V Choppella
IIIT/TR/2013/-1, 2013
22013
Mitigating Web-borne Security Threats by Enhancing Browser Security Policies
KC Telikicherla
International Institute of Information Technology Hyderabad, 2016
2016
Information Systems Security: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings
A Prakash, R Shyamasundar
Springer, 2014
2014
Analysis and detection of modern spam techniques on social networking sites
JPHGKBP Krishna Chaitanya Telikicherla, Dylan Herts
SRII India ICSEM 2012, 14, 2012
2012
CSI Communications
C Weapons, AB Model
2012
Security Concerns in New User Experience Enhancing Features of HTML5
KC Telikicherla, HKB Ponnapalli
Advances in User Experience Design, 19, 2012
2012
Role of mashups, social networking platforms and semantic in revolutionizing web integration: Key insights and enterprise implications
JG Krishna Chaitanya T
AMCIS 2011, 8, 2011
2011
Anatomy of Cross Site Scripting (XSS) Vulnerabilities
KC Telikicherla, HKB Ponnapalli
CSI BIG 2014, 38, 0
系统目前无法执行此操作,请稍后再试。
文章 1–14