Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Segment Based Approach for the Reduction of the Number of Test Cases for Performance Evaluation of Components., , and . International Journal of Software Engineering and Knowledge Engineering, 19 (4): 481-505 (2009)On the selection of software defect estimation techniques., , , and . Softw. Test., Verif. Reliab., 21 (2): 125-152 (2011)Dynamic Control of Worm Propagation., , and . ITCC (1), page 419-423. IEEE Computer Society, (2004)A Learning Model for Software Development Processes., and . IASTED Conf. on Software Engineering, page 474-479. IASTED/ACTA Press, (2005)Penetration Testing for Spam Filters., , and . COMPSAC (2), page 410-415. IEEE Computer Society, (2009)978-0-7695-3726-9.Automatic Stress and Load Testing for Embedded Systems., and . COMPSAC (2), page 229-233. IEEE Computer Society, (2006)0-7695-2655-1.Issues and challenges in securing VoIP., , , and . Computers & Security, 28 (8): 743-753 (2009)Quantifying Reciprocity in Social Networks., , and . CSE (4), page 1031-1035. IEEE Computer Society, (2009)Reducing the Number of Test Cases for Performance Evaluation of Components., , and . SEKE, page 145-150. Knowledge Systems Institute Graduate School, (2007)Change point detection based on call detail records., , and . ISI, page 55-60. IEEE, (2009)