Author of the publication

Could I have a stack trace to examine the dependency conflict issue?

, , , , , , , and . ICSE, page 572-583. IEEE / ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling, analysis and containment of passive worms in P2P networks., , , , and . IJIPT, 8 (2/3): 130-142 (2014)Modified Mutual Information-based Feature Selection for Intrusion Detection Systems in Decision Tree Learning., , , and . JCP, 9 (7): 1542-1546 (2014)The Design of Serial ATA Bus Control Chip., , , and . JCP, 5 (4): 524-532 (2010)A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method., and . ICYCS, page 3057-3061. IEEE Computer Society, (2008)Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering., , and . CD-ARES, volume 8708 of Lecture Notes in Computer Science, page 270-280. Springer, (2014)Anticipatory Runway Incursion Prevention Systems., , , and . IEICE Transactions, 96-D (11): 2385-2396 (2013)Selecting Features for Anomaly Intrusion Detection: A Novel Method using Fuzzy C Means and Decision Tree Classification., , , and . CSS, volume 8300 of Lecture Notes in Computer Science, page 299-307. Springer, (2013)An Adaptive Replanning Mechanism for Dependable Service-Based Systems., , , , and . ICEBE, page 262-269. IEEE Computer Society, (2010)A Dynamic Personalized News Recommendation System Based on BAP User Profiling Method., , , , and . IEEE Access, (2018)A new approach to generalized chaos synchronization based on the stability of the error system., , and . Kybernetika, 44 (4): 492-500 (2008)