Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An evaluation model for dependability of Internet-scale software on basis of Bayesian Networks and trustworthiness., , , and . J. Syst. Softw., (2014)Overview and Framework of Quality Service Metrics for Cloud-Based Robotics Platforms., , and . IEEE Access, (2020)Toward Exploiting Access Control Vulnerabilities within MongoDB Backend Web Applications., , , , , , and . COMPSAC, page 143-153. IEEE Computer Society, (2016)Lom: Discovering logic flaws within MongoDB-based web applications., , , , , , and . Int. J. Autom. Comput., 14 (1): 106-118 (2017)Mosaic method based on feature points detection and tracking for unmanned aerial vehicle videos., , , and . ICNC, page 948-952. IEEE, (2014)Attack Model Based Penetration Test for SQL Injection Vulnerability., , , and . COMPSAC Workshops, page 589-594. IEEE Computer Society, (2012)Challenges and Security Issues in Underwater Wireless Sensor Networks., , , , and . IIKI, volume 147 of Procedia Computer Science, page 210-216. Elsevier, (2018)An Evaluation Model for Dependability of Internet-Scale Software on Basis of Bayesian Networks., , , , and . COMPSAC, page 422-431. IEEE Computer Society, (2012)Multi-Step Ahead Prediction for Anomaly Detection of Geomagnetic Observation in HVDC Transmission., , , , , and . IEEE Access, (2023)Overview of indoor scene recognition and representation methods based on multimodal knowledge graphs., , , , and . Appl. Intell., 54 (1): 899-923 (January 2024)