Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low Tech Hacking., and . Computers & Security, 31 (5): 738 (2012)Coding for Penetration Testers., and . Computers & Security, 31 (2): 252 (2012)DOMdiff: Identification and Classification of Inter-DOM Modifications., and . WI, page 262-269. IEEE Computer Society, (2018)A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences., , , , , and . Comput. Secur., (2022)Covert Computation - Hiding code in code through compile-time obfuscation., , , , , , and . Computers & Security, (2014)CAMETRICS: A Tool for Advanced Combinatorial Analysis and Measurement of Test Sets., , and . ICST Workshops, page 318-327. IEEE Computer Society, (2018)Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models., , , and . ICST Workshops, page 122-130. IEEE, (2019)Automated combinatorial testing for detecting SQL vulnerabilities in web applications., , and . AST@ICSE, page 55-61. IEEE / ACM, (2019)A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection., , , , and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 207-215. Springer, (2019)Applying Combinatorial Testing to Large-Scale Data Processing at Adobe., , , , , , , and . ICST Workshops, page 190-193. IEEE, (2019)