From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying GDPR Privacy Violations Using an Augmented LSTM: Toward an AI-based Violation Alert Systems., , и . ISPA/BDCloud/SocialCom/SustainCom, стр. 1617-1624. IEEE, (2021)A Survey of Using Model-Based Testing to Improve Quality Attributes in Distributed Systems., и . SCSS (2), стр. 283-288. Springer, (2008)Implementing and Evaluating a Runtime Conformance Checker for Mobile Agent Systems., , , и . ICST, стр. 269-278. IEEE Computer Society, (2011)Generating Optimal Attack Paths in Generative Adversarial Phishing., , , , и . ISI, стр. 1-6. IEEE, (2021)Run-time conformance checking of mobile and distributed systems using executable models., , и . PADTAD, ACM, (2009)Mutation Testing for Evaluating PHP Web Applications., и . Int. J. Softw. Innov., 7 (4): 25-50 (2019)Dispersion-based prediction framework for estimating missing values in wireless sensor networks., , , и . Int. J. Sens. Networks, 12 (3): 149-159 (2012)Comparison between Ad-hoc Retrieval and Filtering Retrieval Using Arabic Documents., , , и . Int. J. Comput. Proc. Oriental Lang., 17 (3): 181-199 (2004)Evaluating Maintainability of Open Source Software: A Case Study., , , , и . Int. J. Open Source Softw. Process., 8 (1): 1-20 (2017)Traceability between code and design documentation in database management system: a case study., , и . Int. Arab J. Inf. Technol., 15 (5): 920-926 (2018)