Author of the publication

Heuristics-based infeasible path detection for dynamic test data generation.

, and . Inf. Softw. Technol., 50 (7-8): 641-655 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ER-Based Software Sizing for Data-Intensive Systems., and . ER, volume 3288 of Lecture Notes in Computer Science, page 180-190. Springer, (2004)Auditing the Defense Against Cross Site Scripting in Web Applications., and . SECRYPT, page 505-511. SciTePress, (2010)Improving Requirements Analysis in OO Software Development., and . AMCIS, page 147. Association for Information Systems, (2003)A scalable approach for malware detection through bounded feature space behavior modeling., , , , and . ASE, page 312-322. IEEE, (2013)An approach for the maintenance of input validation., and . Inf. Softw. Technol., 50 (5): 449-461 (2008)Automated Verification and Test Case Generation for Input Validation., and . AST, page 29-35. ACM, (2006)Auditing the XSS defence features implemented in web application programs., and . IET Softw., 6 (4): 377-390 (2012)Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation., , , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2012)Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities., and . ICSE, page 1293-1296. IEEE Computer Society, (2012)Extraction of Attribute Dependency Graph from Database Applications., , and . APSEC, page 138-145. IEEE Computer Society, (2011)