Author of the publication

An automated framework for evaluating open-source web scanner vulnerability severity.

, , , , and . Serv. Oriented Comput. Appl., 14 (4): 297-307 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Elimination by Linear Association: An Effective and Efficient Static Mirror Adaptive Random Testing., , , and . IEEE Access, (2019)A Deep End-to-End Model for Transient Stability Assessment With PMU Data., , , , , , and . IEEE Access, (2018)A Review of Research on Privacy Protection of Internet of Vehicles Based on Blockchain., , , and . J. Sens. Actuator Networks, 11 (4): 86 (2022)Privacy-Preserving Hierarchical State Estimation in Untrustworthy Cloud Environments., , , and . IEEE Trans. Smart Grid, 12 (2): 1541-1551 (2021)Distributed Framework for Detecting PMU Data Manipulation Attacks With Deep Autoencoders., , , , , and . IEEE Trans. Smart Grid, 10 (4): 4401-4410 (2019)An automated framework for evaluating open-source web scanner vulnerability severity., , , , and . Serv. Oriented Comput. Appl., 14 (4): 297-307 (2020)A Taxonomic Review of Adaptive Random Testing: Current Status, Classifications, and Issues., , , and . CoRR, (2019)An efficient outlier detection method for data streams based on closed frequent patterns by considering anti-monotonic constraints., , , , , , and . Inf. Sci., (2021)One-Domain-One-Input: Adaptive Random Testing by Orthogonal Recursive Bisection With Restriction., , , , , and . IEEE Trans. Reliab., 68 (4): 1404-1428 (2019)Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method., , , , , , and . Int. J. Softw. Eng. Knowl. Eng., 27 (8): 1235-1268 (2017)