Home / Journals / CSSE / Vol.40, No.3, 2022
Special lssues
  • Open AccessOpen Access

    ARTICLE

    Hybrid Active Contour Mammographic Mass Segmentation and Classification

    K. Yuvaraj*, U. S. Ragupathy
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 823-834, 2022, DOI:10.32604/csse.2022.018837
    Abstract This research implements a novel segmentation of mammographic mass. Three methods are proposed, namely, segmentation of mass based on iterative active contour, automatic region growing, and fully automatic mask selection-based active contour techniques. In the first method, iterative threshold is performed for manual cropped preprocessed image, and active contour is applied thereafter. To overcome manual cropping in the second method, an automatic seed selection followed by region growing is performed. Given that the result is only a few images owing to over segmentation, the third method uses a fully automatic active contour. Results of the segmentation techniques are compared with… More >

  • Open AccessOpen Access

    ARTICLE

    On Vertex-Edge-Degree Topological Descriptors for Certain Crystal Networks

    Sadia Husain1, Fouad A. Abolaban2, Ali Ahmad1, Muhammad Ahsan Asim1, Yasir Ahmad1
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 835-850, 2022, DOI:10.32604/csse.2022.018534
    Abstract Due to the combinatorial nature of graphs they are used easily in pure sciences and social sciences. The dynamical arrangement of vertices and their associated edges make them flexible (like liquid) to attain the shape of any physical structure or phenomenon easily. In the field of ICT they are used to reflect distributed component and communication among them. Mathematical chemistry is another interesting domain of applied mathematics that endeavors to display the structure of compounds that are formed in result of chemical reactions. This area attracts the researchers due to its applications in theoretical and organic chemistry. It also inspires… More >

  • Open AccessOpen Access

    ARTICLE

    Network Traffic Prediction Using Radial Kernelized-Tversky Indexes-Based Multilayer Classifier

    M. Govindarajan1,*, V. Chandrasekaran2, S. Anitha3
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 851-863, 2022, DOI:10.32604/csse.2022.019298
    Abstract Accurate cellular network traffic prediction is a crucial task to access Internet services for various devices at any time. With the use of mobile devices, communication services generate numerous data for every moment. Given the increasing dense population of data, traffic learning and prediction are the main components to substantially enhance the effectiveness of demand-aware resource allocation. A novel deep learning technique called radial kernelized LSTM-based connectionist Tversky multilayer deep structure learning (RKLSTM-CTMDSL) model is introduced for traffic prediction with superior accuracy and minimal time consumption. The RKLSTM-CTMDSL model performs attribute selection and classification processes for cellular traffic prediction. In… More >

  • Open AccessOpen Access

    ARTICLE

    IoT Wireless Intrusion Detection and Network Traffic Analysis

    Vasaki Ponnusamy1, Aun Yichiet1, NZ Jhanjhi2,*, Mamoona humayun3, Maram Fahhad Almufareh3
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 865-879, 2022, DOI:10.32604/csse.2022.018801
    Abstract Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router. Almost every Internet of Things (IoT) devices such as smartphones, drones, and cameras use wireless technology (Infrared, Bluetooth, IrDA, IEEE 802.11, etc.) to establish multiple inter-device connections simultaneously. With the flexibility of the wireless network, one can set up numerous ad-hoc networks on-demand, connecting hundreds to thousands of users, increasing productivity and profitability significantly. However, the number of network attacks in wireless networks that exploit such flexibilities in setting and tearing down networks has become very alarming. Perpetrators can launch… More >

  • Open AccessOpen Access

    ARTICLE

    Decision Making on Fuzzy Soft Simply* Continuous of Fuzzy Soft Multi-Function

    M. A. El Safty1,*, Samirah Al Zahrani1, Ansari Saleh Ahmar2, M. El Sayed3
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 881-894, 2022, DOI:10.32604/csse.2022.019549
    (This article belongs to this Special Issue: Impact of Industry 4.0 on Supply Chain Management and Optimization)
    Abstract Real world applications are dealing now with a huge amount of data, especially in the area of high dimensional features. In this article, we depict the simply*upper, the simply*lower continuous, we get several characteristics and other properties with respect to upper and lower simply*-continuous soft multi-functions. We also investigate the relationship between soft-continuous, simply*continuous multifunction. We also implement fuzzy soft multifunction between fuzzy soft topological spaces which is Akdag’s generation of the notion. We are introducing a new class of soft open sets, namely soft simply*open set deduce from soft topology, and we are using it to implement the new… More >

  • Open AccessOpen Access

    ARTICLE

    A Coordination-Based Algorithm for Dedicated Destination Vehicle Routing in B2B E-Commerce

    Tsung-Yin Ou1, Chen-Yang Cheng2, Chun Hsiung Lai3, Hsin-Pin Fu1,*
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 895-911, 2022, DOI:10.32604/csse.2022.018432
    Abstract This paper proposes a solution to the open vehicle routing problem with time windows (OVRPTW) considering third-party logistics (3PL). For the typical OVRPTW problem, most researchers consider time windows, capacity, routing limitations, vehicle destination, etc. Most researchers who previously investigated this problem assumed the vehicle would not return to the depot, but did not consider its final destination. However, by considering 3PL in the B2B e-commerce, the vehicle is required back to the nearest 3PL location with available space. This paper formulates the problem as a mixed integer linear programming (MILP) model with the objective of minimizing the total travel… More >

  • Open AccessOpen Access

    ARTICLE

    Tracking Dengue on Twitter Using Hybrid Filtration-Polarity and Apache Flume

    Norjihan Binti Abdul Ghani1,*, Suraya Hamid1, Muneer Ahmad1, Younes Saadi1, N.Z. Jhanjhi2, Mohammed A. Alzain3, Mehedi Masud4
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 913-926, 2022, DOI:10.32604/csse.2022.018467
    Abstract The world health organization (WHO) terms dengue as a serious illness that impacts almost half of the world’s population and carries no specific treatment. Early and accurate detection of spread in affected regions can save precious lives. Despite the severity of the disease, a few noticeable works can be found that involve sentiment analysis to mine accurate intuitions from the social media text streams. However, the massive data explosion in recent years has led to difficulties in terms of storing and processing large amounts of data, as reliable mechanisms to gather the data and suitable techniques to extract meaningful insights… More >

  • Open AccessOpen Access

    ARTICLE

    VacChain: A Blockchain-Based EMR System to Manage Child Vaccination Records

    Azza Abdullah Alnssayan, Mohammad Mahdi Hassan*, Suliman A. Alsuhibany
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 927-945, 2022, DOI:10.32604/csse.2022.016734
    Abstract The digitalization of healthcare-related information service systems has become a trend across the world. However, several crucial services are still provided manually due to a lack of trust in digital solutions. One such service is keeping records of children’s vaccination, which still relies on a paper-based file system in most parts of the world. This approach causes serious data integrity problems. Recently, healthcare has become a potential application area of the blockchain, as it can preserve and protect highly sensitive private medical records while sharing these records in a decentralized manner without losing personal ownership. Therefore, we propose a new… More >

  • Open AccessOpen Access

    ARTICLE

    Prediction Model for Coronavirus Pandemic Using Deep Learning

    Mamoona Humayun1,*, Ahmed Alsayat2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 947-961, 2022, DOI:10.32604/csse.2022.019288
    Abstract The recent global outbreak of COVID-19 damaged the world health systems, human health, economy, and daily life badly. None of the countries was ready to face this emerging health challenge. Health professionals were not able to predict its rise and next move, as well as the future curve and impact on lives in case of a similar pandemic situation happened. This created huge chaos globally, for longer and the world is still struggling to come up with any suitable solution. Here the better use of advanced technologies, such as artificial intelligence and deep learning, may aid healthcare practitioners in making… More >

  • Open AccessOpen Access

    ARTICLE

    Integrated Approach to Detect Cyberbullying Text: Mobile Device Forensics Data

    G. Maria Jones1,*, S. Godfrey Winster2, P. Valarmathie3
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 963-978, 2022, DOI:10.32604/csse.2022.019483
    Abstract Mobile devices and social networks provide communication opportunities among the young generation, which increases vulnerability and cybercrimes activities. A recent survey reports that cyberbullying and cyberstalking constitute a developing issue among youngsters. This paper focuses on cyberbullying detection in mobile phone text by retrieving with the help of an oxygen forensics toolkit. We describe the data collection using forensics technique and a corpus of suspicious activities like cyberbullying annotation from mobile phones and carry out a sequence of binary classification experiments to determine cyberbullying detection. We use forensics techniques, Machine Learning (ML), and Deep Learning (DL) algorithms to exploit suspicious… More >

  • Open AccessOpen Access

    ARTICLE

    Mining Syndrome Differentiating Principles from Traditional Chinese Medicine Clinical Data

    Jialin Ma1,*, Zhaojun Wang2, Hai Guo3, Qian Xie1,4, Tao Wang4, Bolun Chen5
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 979-993, 2022, DOI:10.32604/csse.2022.016759
    Abstract Syndrome differentiation-based treatment is one of the key characteristics of Traditional Chinese Medicine (TCM). The process of syndrome differentiation is difficult and challenging due to its complexity, diversity and vagueness. Analyzing syndrome principles from historical records of TCM using data mining (DM) technology has been of high interest in recent years. Nevertheless, in most relevant studies, existing DM algorithms have been simply developed for TCM mining, while the combination of TCM theories or its characteristics with DM algorithms has rarely been reported. This paper presents a novel Symptom-Syndrome Topic Model (SSTM), which is a supervised probabilistic topic model with three-tier… More >

  • Open AccessOpen Access

    ARTICLE

    Identity Governance Framework for Privileged Users

    Mansour Hammoud Alruwies1, Shailendra Mishra2,*, Mohammed Abdul Rahman AlShehri1
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 995-1005, 2022, DOI:10.32604/csse.2022.019355
    Abstract Information technology companies have grown in size and recognized the need to protect their valuable assets. As a result, each IT application has its authentication mechanism, and an employee needs a username and password. As the number of applications increased, as a result, it became increasingly complex to manage all identities like the number of usernames and passwords of an employee. All identities had to be retrieved by users. Both the identities and the access rights associated with those identities had to be protected by an administrator. Management couldn’t even capture such access rights because they couldn’t verify things like… More >

  • Open AccessOpen Access

    ARTICLE

    I-Quiz: An Intelligent Assessment Tool for Non-Verbal Behaviour Detection

    B. T. Shobana1,*, G. A. Sathish Kumar2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1007-1021, 2022, DOI:10.32604/csse.2022.019523
    Abstract Electronic learning (e-learning) has become one of the widely used modes of pedagogy in higher education today due to the convenience and flexibility offered in comparison to traditional learning activities. Advancements in Information and Communication Technology have eased learner connectivity online and enabled access to an extensive range of learning materials on the World Wide Web. Post covid-19 pandemic, online learning has become the most essential and inevitable medium of learning in primary, secondary and higher education. In recent times, Massive Open Online Courses (MOOCs) have transformed the current education strategy by offering a technology-rich and flexible form of online… More >

  • Open AccessOpen Access

    ARTICLE

    Design Principles-Based Interactive Learning Tool for Solving Nonlinear Equations

    Ahad Alloqmani1, Omimah Alsaedi1, Nadia Bahatheg1, Reem Alnanih1,*, Lamiaa Elrefaei1,2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1023-1042, 2022, DOI:10.32604/csse.2022.019704
    Abstract Interactive learning tools can facilitate the learning process and increase student engagement, especially tools such as computer programs that are designed for human-computer interaction. Thus, this paper aims to help students learn five different methods for solving nonlinear equations using an interactive learning tool designed with common principles such as feedback, visibility, affordance, consistency, and constraints. It also compares these methods by the number of iterations and time required to display the result. This study helps students learn these methods using interactive learning tools instead of relying on traditional teaching methods. The tool is implemented using the MATLAB app and… More >

  • Open AccessOpen Access

    ARTICLE

    An Adaptive Fuzzy Control Model for Multi-Joint Manipulators

    Yanzan Han1,*, Huawen Zhang1, Zengfang Shi1, Shuang Liang2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1043-1057, 2022, DOI:10.32604/csse.2022.017742
    Abstract Multi-joint manipulator systems are subject to nonlinear influences such as frictional characteristics, random disturbances and load variations. To account for uncertain disturbances in the operation of manipulators, we propose an adaptive manipulator control method based on a multi-joint fuzzy system, in which the upper bound information of the fuzzy system is constant and the state variables of the manipulator control system are measurable. The control algorithm of the system is a MIMO (multi-input-multi-output) fuzzy system that can approximate system error by using a robust adaptive control law to eliminate the shadow caused by approximation error. It can ensure the stability… More >

  • Open AccessOpen Access

    ARTICLE

    Heuristic Scheduling of Job Orders in a Build-to-Order Manufacturing System

    Chia-Nan Wang1, Chien-Chang Chou2, Yu-Chi Chung1,*, Nguyen Ky Phuc Phan3, Van Thanh Nguyen4, Viet Tinh Nguyen4
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1059-1072, 2022, DOI:10.32604/csse.2022.018259
    (This article belongs to this Special Issue: Impact of Industry 4.0 on Supply Chain Management and Optimization)
    Abstract With the continuous development of technology, traditional manual work has been becoming more and more automated. Most large or medium-sized companies have applied Enterprise Resource Planning (ERP) software into their business and production activities. However, since many small firms cannot afford ERP because of its expensive cost, they often still employ manual work for the same tasks this software resolves, especially for scheduling. This paper aims to provide a possible solution for small businesses to try automated scheduling and discover whether it can help much. There are two main ways to make this determination: a mathematical model and a heuristic… More >

  • Open AccessOpen Access

    ARTICLE

    Performance Analysis of AODV Routing for Wireless Sensor Network in FPGA Hardware

    Namit Gupta1,*, Kunwar Singh Vaisla2, Arpit Jain3, Adesh Kumar4, Rajeev Kumar3
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1073-1084, 2022, DOI:10.32604/csse.2022.019911
    (This article belongs to this Special Issue: Emerging Trends in Intelligent Communication and Wireless Technologies)
    Abstract Wireless sensor network (WSN) is a group of interconnected sensor nodes that work wirelessly to capture the information of surroundings. The routing of the network is a challenging task. The routing of WSN is classified as proactive, reactive, and hybrid. Adhoc on-demand distance vector (AODV) routing is an example of reactive routing based on the demand route formations among different nodes in the network. The research article emphasizes the design and simulation of the AODV routing hardware chip using very-high-speed integrated circuit hardware description language (VHDL) programming in Xilinx integrated synthesis environment (ISE) 14.7 software. The performance of the chip… More >

  • Open AccessOpen Access

    ARTICLE

    A Tradeoff Between Accuracy and Speed for K-Means Seed Determination

    Farzaneh Khorasani1, Morteza Mohammadi Zanjireh1,*, Mahdi Bahaghighat1, Qin Xin2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1085-1098, 2022, DOI:10.32604/csse.2022.016003
    Abstract With a sharp increase in the information volume, analyzing and retrieving this vast data volume is much more essential than ever. One of the main techniques that would be beneficial in this regard is called the Clustering method. Clustering aims to classify objects so that all objects within a cluster have similar features while other objects in different clusters are as distinct as possible. One of the most widely used clustering algorithms with the well and approved performance in different applications is the k-means algorithm. The main problem of the k-means algorithm is its performance which can be directly affected… More >

  • Open AccessOpen Access

    ARTICLE

    Adaptive Sliding Mode Control Method for Onboard Supercapacitors System

    Yanzan Han1,*, Hang Zhou1, Zengfang Shi1, Shuang Liang2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1099-1108, 2022, DOI:10.32604/csse.2022.017741
    Abstract Urban rail trains have undergone rapid development in recent years due to their punctuality, high capacity and energy efficiency. Urban trains require frequent start/stop operations and are, therefore, prone to high energy losses. As trains have high inertia, the energy that can be recovered from braking comes in short bursts of high power. To effectively recover such braking energy, an onboard supercapacitor system based on a radial basis function neural network-based sliding mode control system is proposed, which provides robust adaptive performance. The supercapacitor energy storage system is connected to a bidirectional DC/DC converter to provide traction energy or absorb… More >

  • Open AccessOpen Access

    ARTICLE

    Solvability of the Nonlocal Inverse Parabolic Problem and Numerical Results

    M. J. Huntul1,*, Taki-Eddine Oussaeif2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1109-1126, 2022, DOI:10.32604/csse.2022.020175
    Abstract In this paper, we consider the unique solvability of the inverse problem of determining the right-hand side of a parabolic equation whose leading coefficient depends on time variable under nonlocal integral overdetermination condition. We obtain sufficient conditions for the unique solvability of the inverse problem. The existence and uniqueness of the solution of the inverse parabolic problem upon the data are established using the fixed point theorem. This inverse problem appears extensively in the modelling of various phenomena in engineering and physics. For example, seismology, medicine, fusion welding, continuous casting, metallurgy, aircraft, oil and gas production during drilling and operation… More >

  • Open AccessOpen Access

    ARTICLE

    Student Behavior Modeling for an E-Learning System Offering Personalized Learning Experiences

    K. Abhirami1,*, M. K. Kavitha Devi2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1127-1144, 2022, DOI:10.32604/csse.2022.020013
    Abstract With the advent of computing and communication technologies, it has become possible for a learner to expand his or her knowledge irrespective of the place and time. Web-based learning promotes active and independent learning. Large scale e-learning platforms revolutionized the concept of studying and it also paved the way for innovative and effective teaching-learning process. This digital learning improves the quality of teaching and also promotes educational equity. However, the challenges in e-learning platforms include dissimilarities in learner’s ability and needs, lack of student motivation towards learning activities and provision for adaptive learning environment. The quality of learning can be… More >

  • Open AccessOpen Access

    ARTICLE

    Model of a Composite Energy Storage System for Urban Rail Trains

    Liang Jin1,*, Qinghui Meng1, Shuang Liang2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1145-1152, 2022, DOI:10.32604/csse.2022.017744
    Abstract This article has no abstract. More >

  • Open AccessOpen Access

    ARTICLE

    Impact of Human Vulnerabilities on Cybersecurity

    Maher Alsharif1, Shailendra Mishra2,*, Mohammed AlShehri1
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1153-1166, 2022, DOI:10.32604/csse.2022.019938
    Abstract Today, security is a major challenge linked with computer network companies that cannot defend against cyber-attacks. Numerous vulnerable factors increase security risks and cyber-attacks, including viruses, the internet, communications, and hackers. Internets of Things (IoT) devices are more effective, and the number of devices connected to the internet is constantly increasing, and governments and businesses are also using these technologies to perform business activities effectively. However, the increasing uses of technologies also increase risks, such as password attacks, social engineering, and phishing attacks. Humans play a major role in the field of cybersecurity. It is observed that more than 39%… More >

  • Open AccessOpen Access

    ARTICLE

    FPD Net: Feature Pyramid DehazeNet

    Shengchun Wang1, Peiqi Chen1, Jingui Huang1,*, Tsz Ho Wong2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1167-1181, 2022, DOI:10.32604/csse.2022.018911
    Abstract We propose an end-to-end dehazing model based on deep learning (CNN network) and uses the dehazing model re-proposed by AOD-Net based on the atmospheric scattering model for dehazing. Compare to the previously proposed dehazing network, the dehazing model proposed in this paper make use of the FPN network structure in the field of target detection, and uses five feature maps of different sizes to better obtain features of different proportions and different sub-regions. A large amount of experimental data proves that the dehazing model proposed in this paper is superior to previous dehazing technologies in terms of PSNR, SSIM, and… More >

  • Open AccessOpen Access

    ARTICLE

    Miniaturized Novel UWB Band-Notch Textile Antenna for Body Area Networks

    Mohammad Monirujjaman Khan1, Arifa Sultana1, Mehedi Masud2,*, Gurjot Singh Gaba3, Hesham A. Alhumyani4
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1183-1198, 2022, DOI:10.32604/csse.2022.019872
    (This article belongs to this Special Issue: Emerging Trends in Intelligent Communication and Wireless Technologies)
    Abstract This paper presents the design and analysis of a miniaturized and novel wearable ultra-wideband (UWB) band-notch textile antenna for Body Area Networks (BANs). The major goal of building the antenna for wearable applications with band notch in X-band is to reject the downlink band (7.25 to 7.75 GHz) of satellite communication in the UWB frequency ranges of 3.1–10.6 GHz to keep away from interference. Computer Simulation Technology (CST) TM Microwave Studio, which is user-friendly and reliable, was used to model and simulate the antenna. The radiating element of the antenna is designed on Jeans’ textile substrate, which has a relative… More >

  • Open AccessOpen Access

    ARTICLE

    Intrusion Detection Systems in Internet of Things and Mobile Ad-Hoc Networks

    Vasaki Ponnusamy1,*, Mamoona Humayun2, N. Z. Jhanjhi3, Aun Yichiet1, Maram Fahhad Almufareh2
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1199-1215, 2022, DOI:10.32604/csse.2022.018518
    Abstract Internet of Things (IoT) devices work mainly in wireless mediums; requiring different Intrusion Detection System (IDS) kind of solutions to leverage 802.11 header information for intrusion detection. Wireless-specific traffic features with high information gain are primarily found in data link layers rather than application layers in wired networks. This survey investigates some of the complexities and challenges in deploying wireless IDS in terms of data collection methods, IDS techniques, IDS placement strategies, and traffic data analysis techniques. This paper’s main finding highlights the lack of available network traces for training modern machine-learning models against IoT specific intrusions. Specifically, the Knowledge… More >

  • Open AccessOpen Access

    ARTICLE

    A CPK-Based Identity Authentication Scheme for IoT

    Mingming Zhang1, Jiaming Mao1,*, Yuanyuan Ma2, Liangjie Xu3, Chuanjun Wang1, Ran Zhao1, Zhihao Li3, Lu Chen4, Wenbing Zhao5
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1217-1231, 2022, DOI:10.32604/csse.2022.017657
    Abstract As the power Internet of Things (IoT) enters the security construction stage, the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and practicality. The existing public key infrastructure (PKI)-based security authentication scheme is currently difficult to apply in many terminals in IoT. Its key distribution and management costs are high, which hinders the development of power IoT security construction. Combined Public Key (CPK) technology uses a small number of seeds to generate unlimited public keys. It is very suitable for identity authentication in the power Internet of Things. In this paper, we… More >

  • Open AccessOpen Access

    ARTICLE

    Web Security: Emerging Threats and Defense

    Abdulwahed Awad Almutairi1, Shailendra Mishra2,*, Mohammed AlShehri1
    Computer Systems Science and Engineering, Vol.40, No.3, pp. 1233-1248, 2022, DOI:10.32604/csse.2022.019427
    Abstract Web applications have become a widely accepted method to support the internet for the past decade. Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities, the configuration is growing and becoming more complicated. The growing demand and complexity also make these web applications a preferred target for intruders on the internet. Even with the support of security specialists, they remain highly problematic for the complexity of penetration and code reviewing methods. It requires considering different testing patterns in both codes reviewing and penetration testing. As a result, the number of hacked… More >

Per Page:

Share Link