Author of the publication

Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses.

, , , and . ICACT, page 1521-1533. IEEE, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prior node selection for scheduling workflows in a heterogeneous system., , and . J. Parallel Distributed Comput., (2017)ORC-GPS: Output Rate-Controlled Scheduling Policy for Delay Guarantees., and . ICC, page 530-535. IEEE, (2007)QoE Metrics in Real-Time Web Games., , , , , and . NBiS, volume 526 of Lecture Notes in Networks and Systems, page 464-473. Springer, (2022)Analysis of DNS Graph of Phishing Websites Using Digital Certificates., , , and . ICACT, page 174-179. IEEE, (2023)Asymmetric RTS/CTS for Exposed Node Reduction in IEEE 802.11 Ad Hoc Networks., , , and . JCSE, 8 (2): 107-118 (2014)Optimizing RTS/CTS to Improve Throughput in Ad Hoc WLANs., , and . FedCSIS, volume 11 of Annals of Computer Science and Information Systems, page 885-889. (2017)Automated Vulnerability Assessment Approach for Web API that Considers Requests and Responses., , , and . ICACT, page 1521-1533. IEEE, (2024)Web Game Development Tool for Learning Communication Functions for Beginners Networked Game Developers., , , , , and . NBiS, volume 526 of Lecture Notes in Networks and Systems, page 484-490. Springer, (2022)An Updated Watch-Over System Using an IoT Device, for Elderly People Living by Themselves., , , , , , and . ICSRS, page 115-119. IEEE, (2018)An Automated Vulnerability Assessment Approach for WebAPI that Considers Requests and Responses., , , , , , , and . ICACT, page 423-430. IEEE, (2022)