Author of the publication

Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses.

, , , and . ICACT, page 1521-1533. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic operation and maintenance systems for switching networks., , and . IEEE Commun. Mag., 28 (9): 34-39 (1990)A Design Model for a Real-Time Voice Storage System., , , and . IEEE Trans. Commun., 30 (1): 53-57 (1982)Asymmetric RTS/CTS for Exposed Node Reduction in IEEE 802.11 Ad Hoc Networks., , , and . JCSE, 8 (2): 107-118 (2014)Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses., , , and . ICACT, page 1521-1533. IEEE, (2024)Optimizing RTS/CTS to Improve Throughput in Ad Hoc WLANs., , and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 885-889. (2017)Adaptive end-to-end QoS mechanism for mobile Internet., , , and . ICUMT, page 162-169. IEEE, (2010)Adaptive QoS Mechanism for Wireless Mobile Network., , and . J. Comput. Sci. Eng., 4 (2): 153-172 (2010)Analysis of DNS Graph of Phishing Websites Using Digital Certificates., , , and . ICACT, page 174-179. IEEE, (2023)A Task Scheduling Method after Clustering for Data Intensive Jobs in Heterogeneous Distributed Systems., , , and . JCSE, (2016)An Automated Vulnerability Assessment Approach for WebAPI that Considers Requests and Responses., , , , , , , and . ICACT, page 423-430. IEEE, (2022)