Author of the publication

An Implementation of Vulnerability Evaluation System for Network Security on CC.

, , and . PDPTA, CSREA Press, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A methodology for modeling influence diagrams: a case-based reasoning approach., , and . Int. Syst. in Accounting, Finance and Management, 9 (1): 55-63 (2000)A case-based reasoning approach for building a decision model., and . Expert Systems, 19 (3): 123-135 (2002)An Empirical Study of Spam and Spam Vulnerable email Accounts., , and . FGCN (1), page 408-413. IEEE Computer Society, (2007)Development of elbow spasticity model for objective training of spasticity assessment of patients post stroke., , , , , , , and . ICORR, page 146-151. IEEE, (2017)Slowee: A Smart Eating-Speed Guide System with Light and Vibration Feedback., , , , , , , , and . CHI Extended Abstracts, page 2563-2569. ACM, (2016)Designing System Model to Detect Malfunction of Gas Sensor in Laboratory Environment., , , and . CSII (selected papers), volume 787 of Studies in Computational Intelligence, page 123-133. Springer, (2018)Design and Implementation of Disaster Information Alert System Using Python in Ubiquitous Environment., , , , and . CSA/CUTE, volume 373 of Lecture Notes in Electrical Engineering, page 403-409. Springer, (2015)The Analysis and Countermeasures on Security Breach of Bitcoin., , , , , and . ICCSA (4), volume 8582 of Lecture Notes in Computer Science, page 720-732. Springer, (2014)Adaptive CBT/Anycast Routing Algorithm for Multimedia Traffic Overload., , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 451-459. Springer, (2004)Efficient Key Distribution Protocol for Secure Multicast Communication., , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 1007-1016. Springer, (2004)