Author of the publication

An Evaluation Framework for Communication and Coordination Processes in Offshore Software Development Outsourcing Relationship: Using Fuzzy Methods.

, , , , , , , , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cyber-Attack Penetration Test and Vulnerability Analysis., , , , and . Int. J. Online Eng., 13 (1): 125-132 (2017)Investigating Brute Force Attack Patterns in IoT Network., , , , , and . J. Electr. Comput. Eng., (2019)Agile Software Development Using Cloud Computing: A Case Study., , , , , and . IEEE Access, (2020)An Improved Robust Misbehavior Detection Scheme for Vehicular Ad Hoc Network., , , and . IEEE Access, (2022)Behavior Pattern Recognition of Game Dragon Nest Using Bloom Filter Method., , , , , , and . Int. J. Commun. Networks Inf. Secur., (2019)Penetration Testing and Mitigation of Vulnerabilities Windows Server., , , , and . Int. J. Netw. Secur., 18 (3): 501-513 (2016)Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network., , , , , , and . IEEE Access, (2021)TCP FIN Flood Attack Pattern Recognition on Internet of Things with Rule Based Signature Analysis., , , , , , , and . Int. J. Online Biomed. Eng., 15 (7): 124-139 (2019)An Improved LSTM-PCA Ensemble Classifier for SQL Injection and XSS Attack Detection., , , , , , , , , and . Comput. Syst. Sci. Eng., 46 (2): 1759-1774 (2023)The State of the Art on Secure Software Engineering: A Systematic Mapping Study., , , and . EASE, page 487-492. ACM, (2020)