Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling sensing radius for efficient wireless sensor deployment., and . ISCIT, page 365-370. IEEE, (2012)Automatic Detection of NoSQL Injection Using Supervised Learning., , , , and . COMPSAC (1), page 760-769. IEEE, (2019)On demand-driven movement strategy for moving beacons in sensor localization., and . J. Netw. Comput. Appl., (2014)An empirical study on typosquatting abuse in Bangladesh., and . NSysS, page 47-54. IEEE, (2017)Vulnerability detection in recent Android apps: An empirical study., , and . NSysS, page 55-63. IEEE, (2017)Review4Repair: Code Review Aided Automatic Program Repairing., , , , , and . CoRR, (2020)How do developers discuss and support new programming languages in technical Q&A site? An empirical study of Go, Swift, and Rust in Stack Overflow., , , and . Inf. Softw. Technol., (2021)Review4Repair: Code review aided automatic program repairing., , , , , and . Inf. Softw. Technol., (2022)Automatic Detection of Five API Documentation Smells: Practitioners' Perspectives., , , and . SANER, page 318-329. IEEE, (2021)A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems., , , and . NSS, page 345-350. IEEE Computer Society, (2010)