Author of the publication

A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection.

, , , , and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 207-215. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KERIS: A CT Tool of the Linux Kernel with Dynamic Memory Analysis Capabilities., , and . Haifa Verification Conference, volume 10629 of Lecture Notes in Computer Science, page 225-228. Springer, (2017)On the applicability of combinatorial testing to web application security testing: a case study., , , and . JAMAICA@ISSTA, page 16-21. ACM, (2014)Combinatorially XSSing Web Application Firewalls., , , , , and . ICST Workshops, page 85-94. IEEE, (2021)Evaluation of the IPO-Family algorithms for test case generation in web security testing., , , and . ICST Workshops, page 1-10. IEEE Computer Society, (2015)Browser fingerprinting using combinatorial sequence testing., , , , and . HotSoS, page 7:1-7:9. ACM, (2019)A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences., , , , , and . Comput. Secur., (2022)Applying Pairwise Combinatorial Testing to Large Language Model Testing., , , , , , , , , and 3 other author(s). ICTSS, volume 14131 of Lecture Notes in Computer Science, page 247-256. Springer, (2023)Summary of Combinatorial Methods for Dynamic Gray-Box SQL Injection Testing., , , and . ICSTW, page 263-265. IEEE, (2023)Weighted Combinatorial Sequence Testing for the TLS Protocol., , , , , and . ICST Workshops, page 46-51. IEEE, (2019)On Combinatorial Security Testing for the Tor Anonymity Network Client., , , , , and . ICSTW, page 207-210. IEEE, (2024)