Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Filters
Results by year
Table representation of search results timeline featuring number of search results per year.
Year | Number of Results |
---|---|
2013 | 2 |
2014 | 1 |
2015 | 1 |
2024 | 0 |
Search Results
4 results
Results by year
Filters applied: . Clear all
It looks like you are searching for an author.
Results are currently sorted by Best Match. To see the newest results first,
change the sort order to Most Recent.
Page 1
Did you mean
jen yi fan
(1 results)?
Multiple-feature extracting modules based leak mining system design.
ScientificWorldJournal. 2013 Dec 17;2013:704865. doi: 10.1155/2013/704865. eCollection 2013.
ScientificWorldJournal. 2013.
PMID: 24453892
Free PMC article.
Vulnerability assessment of IPv6 websites to SQL injection and other application level attacks.
Cho YC, Pan JY.
Cho YC, et al. Among authors: pan jy.
ScientificWorldJournal. 2013 Dec 26;2013:946768. doi: 10.1155/2013/946768. eCollection 2013.
ScientificWorldJournal. 2013.
PMID: 24574863
Free PMC article.
Item in Clipboard
Design and implementation of website information disclosure assessment system.
Cho YC, Pan JY.
Cho YC, et al. Among authors: pan jy.
PLoS One. 2015 Mar 13;10(3):e0117180. doi: 10.1371/journal.pone.0117180. eCollection 2015.
PLoS One. 2015.
PMID: 25768434
Free PMC article.
Item in Clipboard
Hybrid network defense model based on fuzzy evaluation.
Cho YC, Pan JY.
Cho YC, et al. Among authors: pan jy.
ScientificWorldJournal. 2014 Jan 16;2014:178937. doi: 10.1155/2014/178937. eCollection 2014.
ScientificWorldJournal. 2014.
PMID: 24574870
Free PMC article.
Item in Clipboard
Cite
Cite