Author of the publication

Program Slicing Stored XSS Bugs in Web Application.

, , and . TASE, page 191-194. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-objective Evolutionary Algorithm for Mining 3D Clusters in Gene-sample-time Microarray Data., , , and . GrC, page 442-447. IEEE, (2008)An Effective Approach to Measuring and Assessing the Risk of Android Application., , and . TASE, page 31-38. IEEE Computer Society, (2015)ID Repetition in Kad., , , , and . Peer-to-Peer Computing, page 111-120. IEEE, (2009)Improved Graph-Based Bilingual Corpus Selection with Sentence Pair Ranking for Statistical Machine Translation., and . ICTAI, page 446-451. IEEE Computer Society, (2011)Toward an Accurate Snapshot of DHT Networks., , , and . IEEE Communications Letters, 15 (1): 97-99 (2011)A novel fuzzy identity based signature scheme based on the short integer solution problem., and . Computers & Electrical Engineering, 40 (6): 1930-1939 (2014)Digital multisignature on the generalized conic curve over Zn., , and . Computers & Security, 28 (1-2): 100-104 (2009)One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority., , , and . Comput. J., 58 (10): 2509-2519 (2015)The Construction of Fuzzy Concept Lattices Based on (θ, σ)-Fuzzy Rough Approximation Operators., , , and . Fundam. Inform., 111 (1): 33-45 (2011)A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks., , , , and . ICPP, page 680-689. IEEE Computer Society, (2010)