Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical study on typosquatting abuse in Bangladesh., and . NSysS, page 47-54. IEEE, (2017)Vulnerability detection in recent Android apps: An empirical study., , and . NSysS, page 55-63. IEEE, (2017)Automatic Detection of NoSQL Injection Using Supervised Learning., , , , and . COMPSAC (1), page 760-769. IEEE, (2019)Modelling sensing radius for efficient wireless sensor deployment., and . ISCIT, page 365-370. IEEE, (2012)Review4Repair: Code Review Aided Automatic Program Repairing., , , , , and . CoRR, (2020)Review4Repair: Code review aided automatic program repairing., , , , , and . Inf. Softw. Technol., (2022)How do developers discuss and support new programming languages in technical Q&A site? An empirical study of Go, Swift, and Rust in Stack Overflow., , , and . Inf. Softw. Technol., (2021)On demand-driven movement strategy for moving beacons in sensor localization., and . J. Netw. Comput. Appl., (2014)A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing Systems., , , and . NSS, page 345-350. IEEE Computer Society, (2010)Towards Automated Traffic System Using Vehicular Network with Directional Antenna., , , and . FGCN (1), page 454-458. IEEE Computer Society, (2008)