Author of the publication

Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses.

, , , and . ICACT, page 1521-1533. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic operation and maintenance systems for switching networks., , and . IEEE Commun. Mag., 28 (9): 34-39 (1990)Adaptive end-to-end QoS mechanism for mobile Internet., , , and . ICUMT, page 162-169. IEEE, (2010)Analysis of DNS Graph of Phishing Websites Using Digital Certificates., , , and . ICACT, page 174-179. IEEE, (2023)Adaptive QoS Mechanism for Wireless Mobile Network., , and . J. Comput. Sci. Eng., 4 (2): 153-172 (2010)Asymmetric RTS/CTS for Exposed Node Reduction in IEEE 802.11 Ad Hoc Networks., , , and . JCSE, 8 (2): 107-118 (2014)A Design Model for a Real-Time Voice Storage System., , , and . IEEE Trans. Commun., 30 (1): 53-57 (1982)Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses., , , and . ICACT, page 1521-1533. IEEE, (2024)Optimizing RTS/CTS to Improve Throughput in Ad Hoc WLANs., , and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 885-889. (2017)A Task Scheduling Method after Clustering for Data Intensive Jobs in Heterogeneous Distributed Systems., , , and . JCSE, (2016)Cross-Layer Design for Exposed Node Reduction in Ad Hoc WLANs., , , , and . IEICE Trans. Commun., 101-B (7): 1575-1588 (2018)