Author of the publication

Attack Pattern-Based Combinatorial Testing with Constraints for Web Security Testing.

, , , , , and . QRS, page 207-212. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error traces in model-based debugging of hardware description languages., and . AADEBUG, page 43-48. ACM, (2005)AI for Localizing Faults in Spreadsheets., , and . ICTSS, volume 10533 of Lecture Notes in Computer Science, page 71-87. Springer, (2017)A "Strength of Decision Tree Equivalence"-Taxonomy and Its Impact on Test Suite Reduction., , and . ICTSS, volume 10533 of Lecture Notes in Computer Science, page 197-212. Springer, (2017)Metamorphic Testing of Logic Theorem Prover., and . ICTSS, volume 13045 of Lecture Notes in Computer Science, page 131-137. Springer, (2021)Extracting information from driving data using k-means clustering (S)., , and . SEKE, page 610-615. KSI Research Inc., (2021)A Database for the Analysis of Program Change Patterns., , and . NCM (2), page 32-39. IEEE Computer Society, (2008)978-0-7695-3322-3.Mutation Testing for Artificial Neural Networks: An Empirical Evaluation., , and . QRS, page 356-365. IEEE, (2020)On the Automation of Audio Plugin Testing*., and . QRS, page 270-278. IEEE, (2021)Extracting Temporal Models from Data Episodes., and . QRS, page 721-731. IEEE, (2022)Extending Automated FLTL Test Oracles with Diagnostic Support., and . ISSRE Workshops, page 354-361. IEEE, (2019)