Author of the publication

Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning.

, , and . IEEE Trans. Dependable Secur. Comput., 12 (6): 688-707 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Formalization of the Whole-Part Relationship in the Unified Modeling Language., , and . IEEE Trans. Software Eng., 29 (11): 1054-1055 (2003)Systematic Transformation of Functional Analysis Model into OO Design and Implementation., , and . IEEE Trans. Software Eng., 32 (2): 111-135 (2006)Mining key and referential constraints enforcement patterns., , and . SAC, page 850-854. ACM, (2014)Predicting common web application vulnerabilities from input validation and sanitization code patterns., and . ASE, page 310-313. ACM, (2012)Defending against Buffer-Overflow Vulnerabilities., and . Computer, 44 (11): 53-60 (2011)Supporting the adaptation of open-source database applications through extracting data lifecycles., , and . IET Softw., 7 (4): 213-221 (2013)Automated Insertion of Exception Handling for Key and Referential Constraints., , and . J. Database Manag., 24 (1): 1-19 (2013)Checking enforcement of integrity constraints in database applications based on code patterns., , , , , , and . J. Syst. Softw., 84 (12): 2253-2264 (2011)Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities., , , and . APSEC (1), page 363-370. IEEE Computer Society, (2013)978-1-4799-2143-0.Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications., and . APSEC (1), page 223-230. IEEE Computer Society, (2013)978-1-4799-2143-0.