Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Critical Systems and Software Risk to Public Safety: Issues and Research Directions., and . Software Engineering Research and Practice, page 93-99. CSREA Press, (2006)Conceptual Model for Integration of COTS Components., and . Software Engineering Research and Practice, page 613-619. CSREA Press, (2006)A Framework for Domain-Specific Reusable Component., and . Software Engineering Research and Practice, page 384-390. CSREA Press, (2003)ProClick: a framework for testing clickjacking attacks in web applications., , and . SIN, page 144-151. ACM, (2013)Analysis of Sampling Techniques Towards Epileptic Seizure Detection from Imbalanced Dataset., , and . COMPSAC, page 684-692. IEEE, (2020)Integration of Wrapper Preprocessor into C/C++ IDE for Implementing Reusable Components., and . Software Engineering Research and Practice, page 408-416. CSREA Press, (2005)Study of Information Retrieval Systems and Software Reuse Libraries., and . Software Engineering Research and Practice, page 173-178. CSREA Press, (2006)On Novelty Evaluation of Potentially Useful Patterns., , , and . DMIN, page 211-217. CSREA Press, (2006)Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection., , , , , , , , and . CoRR, (2022)Malicious URL Detection Using Supervised Machine Learning Techniques., , , , and . SIN, page 21:1-21:6. ACM, (2020)