Author of the publication

A Reference Infrastructure for Electronic Commerce.

, , and . APAQS, page 324-334. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Insertion of Exception Handling for Key and Referential Constraints., , and . J. Database Manag., 24 (1): 1-19 (2013)Defending against Buffer-Overflow Vulnerabilities., and . IEEE Computer, 44 (11): 53-60 (2011)Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications., and . Software Engineering Research and Practice, page 522-528. CSREA Press, (2010)Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code Attributes., and . ISSRE Workshops, page 317-322. IEEE Computer Society, (2014)Software Cost Estimation through Conceptual Requirement., , and . QSIC, page 141-. IEEE Computer Society, (2003)Systematic Transformation of Functional Analysis Model into OO Design and Implementation., , and . IEEE Trans. Software Eng., 32 (2): 111-135 (2006)On Formalization of the Whole-Part Relationship in the Unified Modeling Language., , and . IEEE Trans. Software Eng., 29 (11): 1054-1055 (2003)Checking enforcement of integrity constraints in database applications based on code patterns., , , , , , and . Journal of Systems and Software, 84 (12): 2253-2264 (2011)Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning., and . COMPSAC, page 450-459. IEEE Computer Society, (2015)Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities., , , and . APSEC (1), page 363-370. IEEE Computer Society, (2013)978-1-4799-2143-0.