Author of the publication

Improving Requirements Analysis in OO Software Development.

, and . AMCIS, page 147. Association for Information Systems, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Requirements Analysis in OO Software Development., and . AMCIS, page 147. Association for Information Systems, (2003)A scalable approach for malware detection through bounded feature space behavior modeling., , , , and . ASE, page 312-322. IEEE, (2013)Auditing the Defense Against Cross Site Scripting in Web Applications., and . SECRYPT, page 505-511. SciTePress, (2010)Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation., , , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2012)Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities., and . ICSE, page 1293-1296. IEEE Computer Society, (2012)Extraction of Attribute Dependency Graph from Database Applications., , and . APSEC, page 138-145. IEEE Computer Society, (2011)ER-Based Software Sizing for Data-Intensive Systems., and . ER, volume 3288 of Lecture Notes in Computer Science, page 180-190. Springer, (2004)An approach for the maintenance of input validation., and . Inf. Softw. Technol., 50 (5): 449-461 (2008)Auditing the XSS defence features implemented in web application programs., and . IET Softw., 6 (4): 377-390 (2012)Automated Verification and Test Case Generation for Input Validation., and . AST, page 29-35. ACM, (2006)