Author of the publication

Vulnerability identification and classification via text mining bug databases.

, , and . IECON, page 3612-3618. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Wijayasekara, Dumidu
add a person with the name Wijayasekara, Dumidu
 

Other publications of authors with the same name

Vulnerability identification and classification via text mining bug databases., , and . IECON, page 3612-3618. IEEE, (2014)Next Generation Emergency Communication Systems via Software Defined Networks., , , , , , , and . GREE, page 1-8. IEEE Computer Society, (2014)Optimal placement of Phasor Measurement Units in power grids using Memetic Algorithms., , , and . ISIE, page 2035-2041. IEEE, (2014)Shadowed Type-2 Fuzzy Logic Systems., , and . T2FUZZ, page 15-22. IEEE, (2013)Multi-use high-technology testbed., , , , and . HSI, page 289-295. IEEE, (2016)Data driven fuel efficient driving behavior feedback for fleet vehicles., , and . HSI, page 75-81. IEEE, (2015)Dynamic fuzzy force field based force-feedback for collision avoidance in robot manipulators., and . IECON, page 3997-4003. IEEE, (2014)Visual, linguistic data mining using Self- Organizing Maps., and . IJCNN, page 1-8. IEEE, (2012)Driving behavior prompting framework for improving fuel efficiency., , and . HSI, page 55-60. IEEE, (2014)Fuzzy logic based force-feedback for obstacle collision avoidance of robot manipulators., and . HSI, page 76-81. IEEE, (2014)