Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Realizing Web Application Vulnerability Analysis via AVDL., and . ICEIS (3-2), page 259-265. (2008)978-989-8111-38-8.Blockchain-based Proof of Existence (PoE) Framework using Ethereum Smart Contracts., , , and . CODASPY, page 301-303. ACM, (2021)Fault-tolerant multiprocessor networks. Nanyang Technological University, Singapore, (2003)Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability Model., , , and . AINA Workshops, page 431-436. IEEE Computer Society, (2010)Evaluating AVDL descriptions for web application vulnerability analysis., and . ISI, page 279-281. IEEE, (2008)An empirical vulnerability remediation model., , , and . WCNIS, page 376-380. IEEE, (2010)Using Natural Language Tool to Assist VPRG Automated Extraction from Textual Vulnerability Description., and . AINA Workshops, page 586-592. IEEE Computer Society, (2011)An empirical property-based model for vulnerability analysis and evaluation., , , and . APSCC, page 40-45. IEEE, (2009)A Scalable, Efficient and Reliable Routing Protocol for Wireless Sensor Networks.. UIC, volume 4159 of Lecture Notes in Computer Science, page 409-418. Springer, (2006)An Integrated Smart Contract Vulnerability Detection Tool Using Multi-Layer Perceptron on Real-Time Solidity Smart Contracts., , , and . IEEE Access, (2024)