Author of the publication

A Methodology for Developing an Adjustable Security Design Metric by Mapping Software Testing into Security Testing.

, , , and . Computers and Their Applications, page 213-215. ISCA, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Web-Based Approach for Myofascial Pain Syndrome Monitoring System in the Home., , , and . CAINE, page 246-249. ISCA, (2003)A taxonomy for DOS attacks in VANET., , and . ISCIT, page 26-27. IEEE, (2014)Towards a trust management for VANETs., , and . ICOIN, page 583-587. IEEE Computer Society, (2014)Fault-Tolerance Implementation on P2P Data Mining., , , and . Computers and Their Applications, page 201-204. ISCA, (2004)Using Feedback Cycle for Developing an Adjustable Security Design Metric., , , and . FSKD (2), volume 3614 of Lecture Notes in Computer Science, page 1158-1161. Springer, (2005)An Approach from Software Reliability Modeling to Security Modeling., , and . CATA, page 63-66. ISCA, (2002)Mechanical Software Development Process Model., , and . Computers and Their Applications, page 9-12. ISCA, (2002)A Methodology for Developing an Adjustable Security Design Metric by Mapping Software Testing into Security Testing., , , and . Computers and Their Applications, page 213-215. ISCA, (2004)A comparison on information fusion methods for air target identification., , , and . SAC, page 45-46. ACM, (2005)