Author of the publication

Search-Based SQL Injection Attacks Testing Using Genetic Programming.

, , and . EuroGP, volume 9594 of Lecture Notes in Computer Science, page 183-198. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements., , and . STA, volume 186 of Communications in Computer and Information Science, page 29-36. Springer, (2011)An Event-B Approach to Data Sharing Agreements., , , and . IFM, volume 6396 of Lecture Notes in Computer Science, page 28-42. Springer, (2010)Configuring storage-area networks using mandatory security., , , and . Journal of Computer Security, 17 (2): 191-210 (2009)Towards Consensus-Based Group Decision Making for Co-Owned Data Sharing in Online Social Networks., , and . IEEE Access, (2020)New Computing Model for Securing Mobile Agents in IP Networks., , and . IoTBDS, page 232-238. SciTePress, (2017)Formal Analysis by Abstract Interpretation - Case Studies in Modern Protocols. Springer, (2022)Cloud-based federated identity for the Internet of Things., and . Ann. des Télécommunications, 73 (7-8): 415-427 (2018)A Study on Human Perception of Document Paragraph Layout., and . IISA, page 1-8. IEEE, (2023)Towards Secure Data Sharing Processes in Online Social Networks: Trusty., , and . ICSOFT, page 418-425. ScitePress, (2020)Epistemology for Cyber Security: A Controlled Natural Language Approach., , and . ICIKS, volume 486 of Lecture Notes in Business Information Processing, page 267-282. Springer, (2023)