Author of the publication

Achieving High Code Coverage in Android UI Testing via Automated Widget Exercising.

, , , and . APSEC, page 193-200. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Formalization of the Whole-Part Relationship in the Unified Modeling Language., , and . IEEE Trans. Software Eng., 29 (11): 1054-1055 (2003)Systematic Transformation of Functional Analysis Model into OO Design and Implementation., , and . IEEE Trans. Software Eng., 32 (2): 111-135 (2006)Predicting common web application vulnerabilities from input validation and sanitization code patterns., and . ASE, page 310-313. ACM, (2012)Mining key and referential constraints enforcement patterns., , and . SAC, page 850-854. ACM, (2014)Defending against Buffer-Overflow Vulnerabilities., and . Computer, 44 (11): 53-60 (2011)Automated Insertion of Exception Handling for Key and Referential Constraints., , and . J. Database Manag., 24 (1): 1-19 (2013)Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications., and . Software Engineering Research and Practice, page 522-528. CSREA Press, (2010)Supporting the adaptation of open-source database applications through extracting data lifecycles., , and . IET Softw., 7 (4): 213-221 (2013)Checking enforcement of integrity constraints in database applications based on code patterns., , , , , , and . J. Syst. Softw., 84 (12): 2253-2264 (2011)Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities., , , and . APSEC (1), page 363-370. IEEE Computer Society, (2013)978-1-4799-2143-0.