Author of the publication

A Software Assessment Method Based on Relevance Vulnerability.

, , , , , and . CIS, page 424-427. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPGA-based approximate calculation system of General Vector Machine., , , , , , and . Microelectronics Journal, (2019)Adaptive Estimation and Cooperative Guidance for Active Aircraft Defense in Stochastic Scenario., , and . Sensors, 19 (4): 979 (2019)Explicit proactive handoff with motion prediction for mobile IP., and . WCNC, page 855-860. IEEE, (2004)A Software Assessment Method Based on Relevance Vulnerability., , , , , and . CIS, page 424-427. IEEE Computer Society, (2015)A novel approach for mobile malware classification and detection in Android systems., , , , , and . Multimedia Tools Appl., 78 (3): 3529-3552 (2019)Virtual Element Methods for Elliptic Variational Inequalities of the Second Kind., , and . J. Sci. Comput., 80 (1): 60-80 (2019)Parameter sensitivity analysis of crop growth models based on the extended Fourier Amplitude Sensitivity Test method., , , and . Environmental Modelling and Software, (2013)Establishing rapid production system of ortho image based on aerial camera with high-precision POS system., , , , , and . Geoinformatics, page 1-5. IEEE, (2010)Guaranteeing application-to-application deadlines in distributed real-time systems., , and . LCN, page 296-305. IEEE Computer Society, (1995)Designing Smart Services: A System Dynamics-Based Business Modeling Method for IoT-Enabled Maintenance Services., , , , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2019)