Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blockchain-based secure data transmission for internet of underwater things.. Clust. Comput., 25 (6): 4495-4514 (2022)An empirical assessment of baseline feature location techniques., , , and . Empir. Softw. Eng., 25 (1): 266-321 (2020)Improving sentiment analysis efficacy through feature synchronization., , , , and . Multim. Tools Appl., 80 (9): 13325-13338 (2021)Foundation of Semantic Rule Engine to Protect Web Application Attacks., , , , , and . ISADS, page 95-102. IEEE Computer Society, (2011)Layered Video Transmission Using Wireless Path Diversity Based on Grey Relational Analysis., and . ICC, page 1-6. IEEE, (2011)Correction to: An empirical assessment of baseline feature location techniques., , , and . Empir. Softw. Eng., 26 (3): 49 (2021)Identification and Prioritization of Cloud Based Global Software Development Best Practices., , , , , and . IEEE Access, (2020)The Effect of Feature Characteristics on the Performance of Feature Location Techniques., , , , and . IEEE Trans. Software Eng., 48 (6): 2066-2085 (2022)A systematic mapping study: The new age of software architecture from monolithic to microservice architecture - awareness and challenges., and . Comput. Appl. Eng. Educ., 31 (2): 421-451 (March 2023)Semantic security against web application attacks., , , , , and . Inf. Sci., (2014)