Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey and Analysis of Current CAPTCHA Approaches., and . J. Web Eng., 12 (1&2): 1-40 (2013)Enhancing CAPTCHA Security Using Interactivity, Dynamism, and Mouse Movement Patterns., and . Int. J. Syst. Serv. Oriented Eng., 6 (1): 17-36 (2016)Towards Building a New Age Commercial Contextual Advertising System., , and . Int. J. Syst. Serv. Oriented Eng., 7 (3): 1-14 (2017)Refactoring Flash Embedding Methods., and . Int. J. Syst. Serv. Oriented Eng., 3 (3): 26-40 (2012)FTT: A System to Refactor Traditional Forms into Ajax-Enabled Forms., and . Int. J. Syst. Serv. Oriented Eng., 2 (4): 1-20 (2011)Centroidal Voronoi Tessellations - A New Approach to Random Testing., , and . IEEE Trans. Software Eng., 39 (2): 163-183 (2013)Detecting visually similar Web pages: Application to phishing detection., , and . ACM Trans. Internet Techn., 10 (2): 5:1-5:38 (2010)Changing Programming Paradigm - An Empirical Investigation., , , , and . Software Quality and Productivity, volume 3 of IFIP Conference Proceedings, page 62-65. Chapman & Hall, (1994)Evaluating inheritance depth on the maintainability of object-oriented software., , , , and . Empirical Software Engineering, 1 (2): 109-132 (1996)Automated cookie collection testing., and . ACM Trans. Softw. Eng. Methodol., 23 (1): 3:1-3:40 (2014)