Author of the publication

Vulnerability identification and classification via text mining bug databases.

, , and . IECON, page 3612-3618. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart grid data integrity attacks: characterizations and countermeasuresπ., , , , , and . SmartGridComm, page 232-237. IEEE, (2011)Vulnerability identification and classification via text mining bug databases., , and . IECON, page 3612-3618. IEEE, (2014)Are Vulnerability Disclosure Deadlines Justified?, , and . Metrisec@ESEM, page 96-101. IEEE, (2011)Measuring the attack surfaces of two FTP daemons., , , and . QoP, page 3-10. ACM, (2006)Smart Grid Data Integrity Attacks., , , , , and . IEEE Trans. Smart Grid, 4 (3): 1244-1253 (2013)Optimal placement of Phasor Measurement Units in power grids using Memetic Algorithms., , , and . ISIE, page 2035-2041. IEEE, (2014)Information gain based dimensionality selection for classifying text documents., , and . IEEE Congress on Evolutionary Computation, page 440-445. IEEE, (2013)Scheduling Issues In Survivability Applications Using Hybrid Fault Models., , , and . Parallel Process. Lett., 14 (1): 5-22 (2004)Analyses of Two End-User Software Vulnerability Exposure Metrics., , and . ARES, page 1-10. IEEE Computer Society, (2012)Analyses of two end-user software vulnerability exposure metrics (extended version)., , and . Inf. Secur. Tech. Rep., 17 (4): 173-184 (2013)