Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Personal Software Process Tool for Eclipse Environment., , , and . Software Engineering Research and Practice, page 717-723. CSREA Press, (2005)Teaching Operating Systems Using Visualization: A Comparative Study., , , and . Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Springer, (2008)An Automated Security Concerns Recommender Based on Use Case Specification Ontology., , , and . Autom. Softw. Eng., 29 (2): 42 (2022)A Survey of U.S. Laws for Health Information Security & Privacy., , , and . Int. J. Inf. Secur. Priv., 6 (4): 40-54 (2012)A Method for Developing Abuse Cases and Its Evaluation., , , and . J. Softw., 11 (5): 520-527 (2016)Spatiotemporal Evolutions of the Suspended Particulate Matter in the Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery., , , , , , , , , and . Remote. Sens., 15 (19): 4769 (October 2023)Case studies for teaching physical security and security policy., , , and . InfoSecCD, page 21-26. ACM, (2010)Retrieving relevant CAPEC attack patterns for secure software development., , , and . CISR, page 33-36. ACM, (2014)US Traffic Sign Recognition Using CNNs., , and . IntelliSys (3), volume 1252 of Advances in Intelligent Systems and Computing, page 657-661. Springer, (2020)Semi-Supervised Self Training to Assess the Credibility of Tweets., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1532-1537. IEEE, (2021)