Author of the publication

Efficient n-Gram-Based String Matching in Electronic Testing at Programming.

, and . ICCCI, volume 8083 of Lecture Notes in Computer Science, page 661-670. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips., , , and . Acta Informatica Pragensia, 7 (2): 138-151 (2018)Visualizing and Assessing a Compositional Approach to Service-Oriented Business Process Design Using Unified Modelling Language (UML)., , , and . Computer and Information Science, 4 (3): 43-59 (2011)A cognitive buying decision-making process in B2B e-commerce using Analytic-MLP., , and . Electron. Commer. Res. Appl., (2017)Using Visual Analytics to Develop Situation Awareness in Network Intrusion Detection System., , and . Computer and Information Science, 3 (4): 240-251 (2010)A conceptual analysis and design of a management system for "Ifa" (an African traditional oracle)., and . Kybernetes, 38 (3/4): 625-634 (2009)Efficient n-Gram-Based String Matching in Electronic Testing at Programming., and . ICCCI, volume 8083 of Lecture Notes in Computer Science, page 661-670. Springer, (2013)Toward ontology-based risk management framework for software projects: An empirical study., , , , and . J. Softw. Evol. Process., (2020)TCP Window Based Congestion Control -Slow-Start Approach., , , , , and . Commun. Netw., 3 (2): 85-98 (2011)Visualizing Concurrency Control Algorithms for Real-Time Database Systems., , and . Data Sci. J., (2008)A new two-tiered strategy to intrusion detection., , and . Inf. Manag. Comput. Secur., 12 (1): 27-44 (2004)