Author of the publication

Combinatorial methods for dynamic gray-box SQL injection testing.

, , , and . Softw. Test. Verification Reliab., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the applicability of combinatorial testing to web application security testing: a case study., , , and . JAMAICA@ISSTA, page 16-21. ACM, (2014)KERIS: A CT Tool of the Linux Kernel with Dynamic Memory Analysis Capabilities., , and . Haifa Verification Conference, volume 10629 of Lecture Notes in Computer Science, page 225-228. Springer, (2017)Evaluation of the IPO-Family algorithms for test case generation in web security testing., , , and . ICST Workshops, page 1-10. IEEE Computer Society, (2015)Combinatorially XSSing Web Application Firewalls., , , , , and . ICST Workshops, page 85-94. IEEE, (2021)Browser fingerprinting using combinatorial sequence testing., , , , and . HotSoS, page 7:1-7:9. ACM, (2019)A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences., , , , , and . Comput. Secur., (2022)Applying Pairwise Combinatorial Testing to Large Language Model Testing., , , , , , , , , and 3 other author(s). ICTSS, volume 14131 of Lecture Notes in Computer Science, page 247-256. Springer, (2023)Combinatorial Methods for Modelling Composed Software Systems., , and . ICST Workshops, page 229-238. IEEE Computer Society, (2017)HYDRA: Feedback-driven black-box exploitation of injection vulnerabilities., , and . Inf. Softw. Technol., (2021)Combinatorial Sequences for Disaster Scenario Generation., , , and . Oper. Res. Forum, (June 2023)