Author of the publication

Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings.

, , , , and . ICSOFT, page 137-145. SCITEPRESS, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Applicable Family of Data Flow Testing Criteria., and . IEEE Trans. Software Eng., 14 (10): 1483-1498 (1988)An Experimental Comparison of the Effectiveness of Branch Testing and Data Flow Testing., and . IEEE Trans. Software Eng., 19 (8): 774-787 (1993)Design of a Laboratory for Information Security Education., , , and . World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, page 61-73. Kluwer, (2003)Query-based test generation for database applications., , and . DBTest, page 6. ACM, (2008)Property-Based Peer Trust in the Sleeper Service Discovery Protocol., , and . COMPSAC (2), page 209-214. IEEE Computer Society, (2006)0-7695-2655-1.Comparison of delivered reliability of branch, data flow and operational testing: A case study., and . ISSTA, page 124-134. ACM, (2000)Testing Database Transaction Concurrency., , and . ASE, page 184-195. IEEE Computer Society, (2003)Assessing and enhancing software testing effectiveness.. ACM SIGSOFT Softw. Eng. Notes, 25 (1): 50-51 (2000)Adaptive Testing of Non-Deterministic Communication Protocols., and . Protocol Test Systems, volume C-19 of IFIP Transactions, page 347-362. North-Holland, (1993)Preventing Web Application Injections with Complementary Character Coding., and . ESORICS, volume 6879 of Lecture Notes in Computer Science, page 80-99. Springer, (2011)