A memory-related vulnerability detection approach based on vulnerability features J Hu, J Chen, L Zhang, Y Liu, Q Bao, H Ackah-Arthur, C Zhang Tsinghua Science and Technology 25 (5), 604-613, 2020 | 22 | 2020 |
One-domain-one-input: Adaptive random testing by orthogonal recursive bisection with restriction H Ackah-Arthur, J Chen, D Towey, M Omari, J Xi, R Huang IEEE Transactions on Reliability 68 (4), 1404-1428, 2019 | 13 | 2019 |
A method for software vulnerability detection based on improved control flow graph M Zhou, J Chen, Y Liu, H Ackah-Arthur, S Chen, Q Zhang, Z Zeng Wuhan University Journal of Natural Sciences 24 (2), 149-160, 2019 | 12 | 2019 |
Design and construction of a bidirectional digital visitor counter W Adjardjah, G Essien, H Ackah-Arthur Computer Engineering and Intelligent Systems 7 (2), 2016 | 10 | 2016 |
A taxonomic review of adaptive random testing: current status, classifications, and issues J Chen, H Ackah-Arthur, C Mao, PK Kudjo arXiv preprint arXiv:1909.10879, 2019 | 9 | 2019 |
Elimination by linear association: An effective and efficient static mirror adaptive random testing M Omari, J Chen, H Ackah-Arthur, PK Kudjo IEEE Access 7, 71038-71060, 2019 | 5 | 2019 |
A cost‐effective adaptive random testing approach by dynamic restriction H Ackah-Arthur, J Chen, J Xi, M Omari, H Song, R Huang IET Software 12 (6), 489-497, 2018 | 4 | 2018 |
An effective long string searching algorithm towards component security testing J Chen, L Zhu, Z Xie, M Omari, H Ackah-Arthur, S Cai, R Huang China Communications 13 (11), 153-169, 2016 | 3 | 2016 |
Random border mirror transform: a diversity based approach to an effective and efficient mirror adaptive random testing M Omari, J Chen, PK Kudjo, H Ackah-Arthur, R Huang 2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019 | 2 | 2019 |
An architecture of urban regional health information system and its data conversion algorithm J Chen, L Zhang, AA Hilary, O Michael, J Xi Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017 | 1 | 2017 |
基于约束和划分策略的自适应随机测试方法改进的研究 H Ackah-Arthur 江苏大学, 2019 | | 2019 |
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method J Chen, S Cai, D Towey, L Zhu, R Huang, H Ackah-Arthur, M Omari International Journal of Software Engineering and Knowledge Engineering 27 …, 2017 | | 2017 |
Complex Networks and their Contribution to Real Network Design-A Survey H Ackah-Arthur Saudi Journal of Engineering and Technology 2 (5), 185 - 191, 2017 | | 2017 |
Analysis of factors responsible for low patronage of fixed line broadband internet access in Ghana G Essien, H Ackah-Arthur, W Adjardjah Journal of Information Engineering and Applications 6 (1), 2016 | | 2016 |
Mobile Network Backbone Upgrade: How Mobile Operators Can Solve Future Bandwidth Demands H Ackah-Arthur, W Adjardjarh, G Essien Journal of Information Engineering and Applications 5 (12), 2015 | | 2015 |
Abdollahi Vayghan, Leila 176 Ackah-Arthur, Hilary 54 Ai, Jun 1 Alam, Dewan Mohammad Moksedul 216 R Alfayez, F Avellaneda, B Boehm, F Boulanger, KY Cai, W Cai, X Che, ... | | |