Author of the publication

A Mechanism on Risk Analysis of Information Security with Dynamic Assessment.

, , , and . INCoS, page 643-646. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporally Coherent Illumination Normalization for Indocyanine Green Video Angiography., , , and . IEEE J. Biomed. Health Informatics, 22 (2): 570-578 (2018)Hawkeye: Finding spamming accounts., , , , , and . APNOMS, page 1-4. IEEE, (2014)TransSQL: A Translation and Validation-Based Solution for SQL-injection Attacks., , , , , and . RVSP, page 248-251. IEEE Computer Society, (2011)Robust Pairwise Registration for Images of Indocyanine-Green Angiographic Sequences., , , and . ISPAN, page 394-399. IEEE Computer Society, (2009)An Analysis of Security Patch Lifecycle Using Google Trend Tool., , , and . AsiaJCIS, page 31-34. IEEE Computer Society, (2012)Protect mobile RFID location privacy using dynamic identity., , and . IEEE ICCI, page 366-374. IEEE Computer Society, (2008)A Novel Authentication Protocol for Micropayment with Wearable Devices., , , , and . IMCOM, page 18:1-18:7. ACM, (2016)A Mechanism on Risk Analysis of Information Security with Dynamic Assessment., , , and . INCoS, page 643-646. IEEE Computer Society, (2011)Vascular Tree Construction with Anatomical Realism for Retinal Images., , , , , and . BIBE, page 313-318. IEEE Computer Society, (2009)Libra: An Adaptive Method for Protecting Memory from Arbitrary Overwrite., , , , and . J. Comput., 11 (4): 280-288 (2016)