Author of the publication

Detecting False Messages in the Smartphone Fault Reporting System.

, , , , , , and . IRICT, volume 1073 of Advances in Intelligent Systems and Computing, page 759-768. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting False Messages in the Smartphone Fault Reporting System., , , , , , and . IRICT, volume 1073 of Advances in Intelligent Systems and Computing, page 759-768. Springer, (2019)Case study: Reconnaissance techniques to support feature location using RECON2., , and . APSEC, page 371-. IEEE Computer Society, (2003)Integration of Secrecy Features in a Federated Database Environment., , and . DBSec, volume A-47 of IFIP Transactions, page 89-108. North-Holland, (1993)An XML-based Security Management Model for Multilevel Security Databases., and . Int. Arab J. Inf. Technol., 3 (2): 95-103 (2006)Re-documenting, Visualizing and Understanding Software System Using DocLike Viewer., , , and . APSEC, page 154-163. IEEE Computer Society, (2003)Implementing a Document-based Requirements Traceability: A Case Study., , , and . IASTED Conf. on Software Engineering, page 124-131. IASTED/ACTA Press, (2005)Production and Maintenance of System Documentation: What, Why, When and How Tools Should Support the Practice., , and . APSEC, page 558-. IEEE Computer Society, (2002)Novel Attack Detection Using Fuzzy Logic and Data Mining., and . Security and Management, page 26-31. CSREA Press, (2006)Distributed Intrusion Detection trust management through integrity and expertise evaluation., , and . CyberSec, page 133-138. IEEE, (2012)Leveraging Remote Attestation to enhance the Unified Trust Model for WSNs., , and . CyberSec, page 139-143. IEEE, (2012)