From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving Requirements Analysis in OO Software Development., и . AMCIS, стр. 147. Association for Information Systems, (2003)A scalable approach for malware detection through bounded feature space behavior modeling., , , , и . ASE, стр. 312-322. IEEE, (2013)An approach for the maintenance of input validation., и . Inf. Softw. Technol., 50 (5): 449-461 (2008)Automated Verification and Test Case Generation for Input Validation., и . AST, стр. 29-35. ACM, (2006)Auditing the XSS defence features implemented in web application programs., и . IET Softw., 6 (4): 377-390 (2012)ER-Based Software Sizing for Data-Intensive Systems., и . ER, том 3288 из Lecture Notes in Computer Science, стр. 180-190. Springer, (2004)Auditing the Defense Against Cross Site Scripting in Web Applications., и . SECRYPT, стр. 505-511. SciTePress, (2010)Extraction of Attribute Dependency Graph from Database Applications., , и . APSEC, стр. 138-145. IEEE Computer Society, (2011)Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation., , , , и . COMPSAC Workshops, стр. 559-564. IEEE Computer Society, (2012)Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities., и . ICSE, стр. 1293-1296. IEEE Computer Society, (2012)