Author of the publication

The architecture and industry applications of web security in static and dynamic analysis.

, and . J. Systems and IT, 12 (2): 105-119 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hisada, Masayuki
add a person with the name Hisada, Masayuki
 

Other publications of authors with the same name

A Novel Incremental Linear Discriminant Analysis for Multitask Pattern Recognition Problems., , , , and . ICONIP (1), volume 5506 of Lecture Notes in Computer Science, page 1163-1171. Springer, (2008)Static Analysis for Web Security in Abstract Syntax Format., , and . International Conference on Internet Computing, page 58-63. CSREA Press, (2009)Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection., , , and . ISA, volume 76 of Communications in Computer and Information Science, page 278-285. Springer, (2010)Coping with the Complexity of SOA Systems with Message Forensics., , , , , , and . AINA Workshops, page 732-737. IEEE Computer Society, (2012)Towards a singularity-based shape language: ridges, ravines, and skeletons for polygonal surfaces., , and . Soft Comput., 7 (1): 45-52 (2002)Implementation of Object Attachments by Cellular Modeling., and . Computer Graphics International, page 159-166. IEEE Computer Society, (2001)The architecture and industry applications of web security in static and dynamic analysis., and . J. Systems and IT, 12 (2): 105-119 (2010)A 3D Voronoi-Based Skeleton and Associated Surface Features., , and . Pacific Conference on Computer Graphics and Applications, page 89-96. IEEE Computer Society, (2001)SOA Web Security and Applications., and . Journal of Object Technology, 9 (2): 163-177 (2010)Metadata Driven Approaches for Web Security of New age Computing., , , and . International Conference on Internet Computing, page 53-58. CSREA Press, (2010)