Author of the publication

Automatic mapping of configuration options in software using static analysis.

, , , , , and . J. King Saud Univ. Comput. Inf. Sci., 34 (10 Part B): 10044-10055 (November 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FingRF: A Generalized Fingerprints Research Framework., and . SPIT/IPC, volume 62 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 1-6. Springer, (2011)TPUAR-Net: Two Parallel U-Net with Asymmetric Residual-Based Deep Convolutional Neural Network for Brain Tumor Segmentation., , , and . ICIAR (2), volume 11663 of Lecture Notes in Computer Science, page 106-116. Springer, (2019)Classification of Brain Tumor MRIs Using a Kernel Support Vector Machine., , , and . WIS, volume 636 of Communications in Computer and Information Science, page 151-160. Springer, (2016)An Application for Singular Point Location in Fingerprint Classification., and . ICDIPC (1), volume 188 of Communications in Computer and Information Science, page 262-276. Springer, (2011)Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks., , , and . EURASIP J. Image Video Process., (2018)Security risk assessment within hybrid data centers: A case study of delay sensitive applications., and . J. Inf. Secur. Appl., (2018)Accurate real-time monitoring of bottlenecks and performance of packet trace collection., , and . LCN, page 884-891. IEEE Computer Society, (2008)AI-powered biometrics for Internet of Things security: A review and future vision., , , and . J. Inf. Secur. Appl., (2024)Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact., , , and . HICSS, page 43-52. IEEE Computer Society, (2015)Evaluation of a Fingerprint Identification Algorithm with SIFT Features., and . IIAI-AAI, page 129-132. IEEE Computer Society, (2012)