Author of the publication

An Efficient Tool for Industrial Control System Security Analysis.

, , , , , , , and . DASC/PiCom/DataCom/CyberSciTech, page 424-427. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Multi-label Tumor Classification Based on Homomorphic Encryption., , and . CCIOT, page 1-7. ACM, (2022)Optimized Neural Network by Genetic Algorithm and Its Application in Fault Diagnosis of Three-level Inverter., , and . CAA SAFEPROCESS, page 116-120. IEEE, (2019)Secure genotype imputation using homomorphic encryption., , , , , and . J. Inf. Secur. Appl., (2023)An effective iris biometric privacy protection scheme with renewability., , , and . J. Inf. Secur. Appl., (February 2024)CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table., , , , and . QRS, page 527-536. IEEE, (2022)Cross-Project Aging-Related Bug Prediction Based on Feature Transfer and Class Imbalance Learning., , , , , , and . ISSREW, page 206-213. IEEE, (2023)End-to-end Distributed Video Coding., , and . DCC, page 496. IEEE, (2022)Word Embeddings and Convolutional Neural Network for Arabic Sentiment Classification., , , , and . COLING, page 2418-2427. ACL, (2016)Increasing design space of the instruction queue with tag coding., and . ACM Great Lakes Symposium on VLSI, page 404-407. ACM, (2005)Improving effort-aware defect prediction by directly learning to rank software modules., , , , , , , and . Inf. Softw. Technol., (January 2024)