Author of the publication

Web application security vulnerabilities detection approaches: A systematic mapping study.

, , , , , and . SNPD, page 469-474. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Smart and Remote Multipurpose Attendance Monitoring System., , and . EAI Endorsed Trans. Energy Web, 7 (30): e5 (2020)FoG-Oriented Secure and Lightweight Data Aggregation in IoMT., , , , , , and . IEEE Access, (2021)Secure Healthcare Data Aggregation and Transmission in IoT - A Survey., , , , , and . IEEE Access, (2021)A Review of Class Based Test Case Generation Techniques., , , , and . J. Softw., 11 (5): 464-480 (2016)Prediction Model for Coronavirus Pandemic Using Deep Learning., and . Comput. Syst. Sci. Eng., 40 (3): 947-961 (2022)Deep Learning Based Sentiment Analysis of COVID-19 Tweets via Resampling and Label Analysis., , , , and . Comput. Syst. Sci. Eng., 47 (1): 575-591 (2023)A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things., , , , , and . Sensors, 22 (18): 7052 (2022)Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey., , , , , and . IEEE Access, (2024)Privacy Protection and Energy Optimization for 5G-Aided Industrial Internet of Things., , , , , and . IEEE Access, (2020)Energy Optimization for Smart Cities Using IoT., , and . Appl. Artif. Intell., (2022)