Author of the publication

Verification of Hibernate Query Language by Abstract Interpretation.

, , and . IScIDE (2), volume 9243 of Lecture Notes in Computer Science, page 116-128. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sensitive information leakage analysis of database code by abstract interpretation.. Int. J. Secur. Networks, 18 (2): 91-105 (2023)Verification of Hibernate Query Language by Abstract Interpretation., , and . IScIDE (2), volume 9243 of Lecture Notes in Computer Science, page 116-128. Springer, (2015)On Preventing SQL Injection Attacks., , , and . ACSS (1), volume 395 of Advances in Intelligent Systems and Computing, page 49-64. Springer, (2015)Policy-Based Slicing of Hibernate Query Language., , , and . CISIM, volume 9339 of Lecture Notes in Computer Science, page 267-281. Springer, (2015)Defining Abstract Semantics for Static Dependence Analysis of Relational Database Applications., and . ICISS, volume 10063 of Lecture Notes in Computer Science, page 151-171. Springer, (2016)Identification of 'Early Career Stage' Researchers from large scale Bibliographic dataset., , , and . ICCCNT, page 1-7. IEEE, (2023)Code-based Analysis Approach to Detect and Prevent SQL Injection Attacks., and . ICCCNT, page 1-6. IEEE, (2020)A Symbolic Model Checker for Database Programs., , and . ICSOFT, page 381-388. SciTePress, (2018)Integrity Constraint Verification of Structured Query Language by Abstract Interpretation., and . OCIT, page 1-6. IEEE, (2022)Secured Peer-to-Peer Energy Trading and Demand Response in Transactive Energy Systems., , and . OCIT, page 793-798. IEEE, (2023)