Author of the publication

Search-based multi-vulnerability testing of XML injections in web applications.

, , , and . Empirical Software Engineering, 24 (6): 3696-3729 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A replicated assessment and comparison of common software cost modeling techniques., , and . ICSE, page 377-386. ACM, (2000)Enabling the runtime assertion checking of concurrent contracts for the Java modeling language., , and . ICSE, page 786-795. ACM, (2011)Model-Driven, Network-Context Sensitive Intrusion Detection., , , and . MoDELS, volume 4735 of Lecture Notes in Computer Science, page 61-75. Springer, (2007)A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems., , and . MoDELS, volume 5795 of Lecture Notes in Computer Science, page 47-61. Springer, (2009)Automated traceability analysis for UML model refinements, , and . Information and Software Technology, (2008)Automatic test suite generation for key-points detection DNNs using many-objective search (experience paper)., , , , and . ISSTA, page 91-102. ACM, (2021)Tackling Model-Based Software Testing and Verification as a Search Problem.. MDEBE@MoDELS, volume 1104 of CEUR Workshop Proceedings, page 1. CEUR-WS.org, (2013)Effective test suites for mixed discrete-continuous stateflow controllers., , , and . ESEC/SIGSOFT FSE, page 84-95. ACM, (2015)Modeling robustness behavior using aspect-oriented modeling to support robustness testing of industrial systems., , and . Softw. Syst. Model., 11 (4): 633-670 (2012)Can We Predict the Quality of Spectrum-based Fault Localization?, , and . ICST, page 4-15. IEEE, (2020)