Author of the publication

Security testing of web applications: a search-based approach for detecting SQL injection vulnerabilities.

, , and . GECCO (Companion), page 417-418. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smart Transformer for the Provision of Coordinated Voltage and Frequency Support in the Grid., , , , , , and . IECON, page 5574-5579. IEEE, (2018)Security testing of web applications: a search-based approach for detecting SQL injection vulnerabilities., , and . GECCO (Companion), page 417-418. ACM, (2019)Singular over-determined systems of linear differential equations., , , and . Math. Comput. Simul., (2022)Modeling and Simulation of Variable Limits on Conditional Anti-Windup PI Controllers for VSC-Based Devices., , and . IEEE Trans. Circuits Syst. I Regul. Pap., 68 (7): 3079-3088 (2021)Graph Algorithms With Partition Transparency., , , and . IEEE Trans. Knowl. Data Eng., 35 (2): 1554-1566 (2023)Dynamic Scaling for Parallel Graph Computations., , , , , and . Proc. VLDB Endow., 12 (8): 877-890 (2019)The role of media coverage in the audience's legitimacy judgment about disruptive innovation: an empirical study of DiDi in China., , , and . Technol. Anal. Strateg. Manag., 35 (9): 1128-1144 (September 2023)Making graphs compact by lossless contraction., , , and . VLDB J., 32 (1): 49-73 (January 2023)Intelligent information extraction from government on-site inspection reports of construction projects: A graph-based text mining approach., , , and . Adv. Eng. Informatics, (October 2023)Making Graphs Compact by Lossless Contraction., , , and . SIGMOD Conference, page 472-484. ACM, (2021)