Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Systematic review of web application security development model., , , and . Artif. Intell. Rev., 43 (2): 259-276 (2015)Language Classes Generated by Tree Controlled Grammars with Bounded Nonterminal Complexity., , and . DCFS, volume 6808 of Lecture Notes in Computer Science, page 289-300. Springer, (2011)Language classes generated by tree controlled grammars with bounded nonterminal complexity., , , and . Theor. Comput. Sci., (2012)Non-use phenomenon of CASE tools: Malaysian experience., , , and . Inf. Softw. Technol., 36 (9): 531-537 (1994)Feature Selection by Ordered Rough Set Based Feature Weighting., , , and . DEXA, volume 3588 of Lecture Notes in Computer Science, page 105-112. Springer, (2005)Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID., and . RFID-TA, page 1-5. IEEE, (2013)An Evaluation Model for Software Reuse Processes., , , , and . ICSECS (3), volume 181 of Communications in Computer and Information Science, page 586-599. Springer, (2011)Testing the Accuracy of Text Deconstruction using PTree tool., , , , , and . Comput. Inf. Sci., 4 (1): 191-197 (2011)The impact of technological factors on information systems success in the electronic-government context., , and . Business Proc. Manag. Journal, 13 (5): 613-627 (2007)Rank-order weighting of web application attributes., , and . Int. Arab J. Inf. Technol., 8 (1): 30-38 (2011)