Follow
Hilary  Ackah-Arthur
Hilary Ackah-Arthur
Computer Science Department, Takoradi Technical University
Verified email at ttu.edu.gh
Title
Cited by
Cited by
Year
A memory-related vulnerability detection approach based on vulnerability features
J Hu, J Chen, L Zhang, Y Liu, Q Bao, H Ackah-Arthur, C Zhang
Tsinghua Science and Technology 25 (5), 604-613, 2020
222020
One-domain-one-input: Adaptive random testing by orthogonal recursive bisection with restriction
H Ackah-Arthur, J Chen, D Towey, M Omari, J Xi, R Huang
IEEE Transactions on Reliability 68 (4), 1404-1428, 2019
132019
A method for software vulnerability detection based on improved control flow graph
M Zhou, J Chen, Y Liu, H Ackah-Arthur, S Chen, Q Zhang, Z Zeng
Wuhan University Journal of Natural Sciences 24 (2), 149-160, 2019
122019
Design and construction of a bidirectional digital visitor counter
W Adjardjah, G Essien, H Ackah-Arthur
Computer Engineering and Intelligent Systems 7 (2), 2016
102016
A taxonomic review of adaptive random testing: current status, classifications, and issues
J Chen, H Ackah-Arthur, C Mao, PK Kudjo
arXiv preprint arXiv:1909.10879, 2019
92019
Elimination by linear association: An effective and efficient static mirror adaptive random testing
M Omari, J Chen, H Ackah-Arthur, PK Kudjo
IEEE Access 7, 71038-71060, 2019
52019
A cost‐effective adaptive random testing approach by dynamic restriction
H Ackah-Arthur, J Chen, J Xi, M Omari, H Song, R Huang
IET Software 12 (6), 489-497, 2018
42018
An effective long string searching algorithm towards component security testing
J Chen, L Zhu, Z Xie, M Omari, H Ackah-Arthur, S Cai, R Huang
China Communications 13 (11), 153-169, 2016
32016
Random border mirror transform: a diversity based approach to an effective and efficient mirror adaptive random testing
M Omari, J Chen, PK Kudjo, H Ackah-Arthur, R Huang
2019 IEEE 19th International Conference on Software Quality, Reliability and …, 2019
22019
An architecture of urban regional health information system and its data conversion algorithm
J Chen, L Zhang, AA Hilary, O Michael, J Xi
Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017
12017
基于约束和划分策略的自适应随机测试方法改进的研究
H Ackah-Arthur
江苏大学, 2019
2019
Detecting Implicit Security Exceptions Using an Improved Variable-Length Sequential Pattern Mining Method
J Chen, S Cai, D Towey, L Zhu, R Huang, H Ackah-Arthur, M Omari
International Journal of Software Engineering and Knowledge Engineering 27 …, 2017
2017
Complex Networks and their Contribution to Real Network Design-A Survey
H Ackah-Arthur
Saudi Journal of Engineering and Technology 2 (5), 185 - 191, 2017
2017
Analysis of factors responsible for low patronage of fixed line broadband internet access in Ghana
G Essien, H Ackah-Arthur, W Adjardjah
Journal of Information Engineering and Applications 6 (1), 2016
2016
Mobile Network Backbone Upgrade: How Mobile Operators Can Solve Future Bandwidth Demands
H Ackah-Arthur, W Adjardjarh, G Essien
Journal of Information Engineering and Applications 5 (12), 2015
2015
Abdollahi Vayghan, Leila 176 Ackah-Arthur, Hilary 54 Ai, Jun 1 Alam, Dewan Mohammad Moksedul 216
R Alfayez, F Avellaneda, B Boehm, F Boulanger, KY Cai, W Cai, X Che, ...
The system can't perform the operation now. Try again later.
Articles 1–16