Author of the publication

Clustering of Defect Reports Using Graph Partitioning Algorithms.

, , , and . SEKE, page 442-445. Knowledge Systems Institute Graduate School, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combinational logic synthesis from an HDL description.. DAC, page 550-555. ACM/IEEE, (1980)On a Generic Security Game Model., and . CoRR, (2018)CoRuM: Collaborative Runtime Monitor Framework for Application Security., and . UCC Companion, page 201-206. IEEE, (2018)Network Intrusion Detection and Comparative Analysis Using Ensemble Machine Learning and Feature Selection., , , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (4): 4821-4833 (December 2022)A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems., and . Comput. Secur., 9 (5): 431-446 (1990)Comparing Agent Software Development Methodologies using the CMMI Engineering Process Model., and . AMCIS, page 510. Association for Information Systems, (2005)Runtime monitors for tautology based SQL injection attacks., and . CyberSec, page 253-258. IEEE, (2012)Requirements Elicitation and Stakeholder Communications for Explainable Machine Learning Systems: State of the Art., , and . ICIT, page 561-566. IEEE, (2023)Machine Learning application lifecycle augmented with explanation and security., and . UEMCON, page 171-177. IEEE, (2021)Energy Efficient Double Critic Deep Deterministic Policy Gradient Framework for Fog Computing., and . AIIoT, page 521-527. IEEE, (2022)