Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey, , and . CoRR, (2011)Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid., , and . iiWAS, page 170-174. ACM, (2014)Using Gravitational Search Algorithm to Support Artificial Neural Network in Intrusion Detection System., , , and . Smart Comput. Rev., 4 (6): 426-434 (2014)Artificial neural networks as multi-networks automated test oracle., , , and . Autom. Softw. Eng., 19 (3): 303-334 (2012)Outlier elimination using granular box regression., , , and . Inf. Fusion, (2016)Designing Test Coverage for Grey Box Analysis., and . QSIC, page 353-356. IEEE Computer Society, (2010)Adoption Factors and Implementation Steps of ITSM in the Target., , , and . Asia International Conference on Modelling and Simulation, page 369-374. IEEE Computer Society, (2009)An evaluation of state-of-the-art approaches for web service selection., , , , , and . iiWAS, page 885-889. ACM, (2010)Software Process Improvement (iSPA) Model Evaluation based on Critical Success Factors of Successful Software Projects., and . Software Engineering Research and Practice, page 363-369. CSREA Press, (2010)Examining Value-Based Factors in Software Development: A Survey Study in Malaysian Public Sector., , and . ASWEC (2), page 13-17. ACM, (2015)