Author of the publication

A Developed Dynamic Environment Fault Injection Tool for Component Security Testing.

, , , and . SSIRI, page 417-422. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Feasible Schedulability Analysis for Fault-Tolerant Hard Real-Time Systems., , and . ICECCS, page 176-183. IEEE Computer Society, (2005)Multi-Robot Avoidance Based on Co-Evolution Computation., , and . ICTAI, page 689-692. IEEE Computer Society, (2005)Using Dependence Matrix to Support Change Impact Analysis for CBS., , and . ICCSA Workshops, page 192-200. IEEE Computer Society, (2007)A Hybrid User and Item-Based Collaborative Filtering with Smoothing on Sparse Data., and . ICAT Workshops, page 184-189. IEEE Computer Society, (2006)Testing Approach of Component Security Based on Fault Injection., , and . CIS, page 763-767. IEEE Computer Society, (2007)Evolutionary Testing of Unstructured Programs Using a Testability Transformation Approach., and . FCST, page 59-66. IEEE Computer Society, (2008)Aggregate-strength interaction test suite prioritization., , , , and . Journal of Systems and Software, (2015)A Grid-Based Subspace Clustering Algorithm for High-Dimensional Data Streams., and . WISE Workshops, volume 4256 of Lecture Notes in Computer Science, page 37-48. Springer, (2006)PrefixTreeESpan: A Pattern Growth Algorithm for Mining Embedded Subtrees., , , and . WISE, volume 4255 of Lecture Notes in Computer Science, page 499-505. Springer, (2006)Detecting geographic locations from web resources., , , , and . GIR, page 17-24. ACM, (2005)