Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey, , and . CoRR, (2011)Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid., , and . iiWAS, page 170-174. ACM, (2014)Artificial neural networks as multi-networks automated test oracle., , , and . Autom. Softw. Eng., 19 (3): 303-334 (2012)Using Gravitational Search Algorithm to Support Artificial Neural Network in Intrusion Detection System., , , and . Smart Comput. Rev., 4 (6): 426-434 (2014)Outlier elimination using granular box regression., , , and . Inf. Fusion, (2016)Designing Test Coverage for Grey Box Analysis., and . QSIC, page 353-356. IEEE Computer Society, (2010)Adoption Factors and Implementation Steps of ITSM in the Target., , , and . Asia International Conference on Modelling and Simulation, page 369-374. IEEE Computer Society, (2009)Software Process Improvement (iSPA) Model Evaluation based on Critical Success Factors of Successful Software Projects., and . Software Engineering Research and Practice, page 363-369. CSREA Press, (2010)An automated framework for software test oracle., , , and . Inf. Softw. Technol., 53 (7): 774-788 (2011)An evaluation of state-of-the-art approaches for web service selection., , , , , and . iiWAS, page 885-889. ACM, (2010)