Author of the publication

Security Oracle Based on Tree Kernel Methods.

, and . EternalS@ECAI, volume 379 of Communications in Computer and Information Science, page 30-43. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities., and . Information & Software Technology, 55 (12): 2209-2222 (2013)Identifying Android inter app communication vulnerabilities using static and dynamic analysis., , , and . MOBILESoft, page 255-266. ACM, (2016)Circe: A grammar-based oracle for testing Cross-site scripting in web applications., and . WCRE, page 262-271. IEEE Computer Society, (2013)Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities., and . SCAM, page 85-94. IEEE Computer Society, (2011)Security Oracle Based on Tree Kernel Methods., and . EternalS@ECAI, volume 379 of Communications in Computer and Information Science, page 30-43. Springer, (2012)Security testing of web applications: A research plan.. ICSE, page 1491-1494. IEEE Computer Society, (2012)Reactive Attestation: Automatic Detection and Reaction to Software Tampering Attacks., , , , , and . SPRO@CCS, page 73-84. ACM, (2016)Grammar based oracle for security testing of web applications., and . AST, page 15-21. IEEE Computer Society, (2012)Towards security testing with taint analysis and genetic algorithms., and . SESS@ICSE, page 65-71. ACM, (2010)Security testing of the communication among Android applications., and . AST, page 57-63. IEEE Computer Society, (2013)