Author of the publication

Automated Extraction of Database Interactions in Web Applications.

, , and . ICPC, page 117-126. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Insertion of Exception Handling for Key and Referential Constraints., , and . J. Database Manag., 24 (1): 1-19 (2013)Checking enforcement of integrity constraints in database applications based on code patterns., , , , , , and . J. Syst. Softw., 84 (12): 2253-2264 (2011)Defending against Buffer-Overflow Vulnerabilities., and . Computer, 44 (11): 53-60 (2011)Supporting the adaptation of open-source database applications through extracting data lifecycles., , and . IET Softw., 7 (4): 213-221 (2013)Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities., , , and . APSEC (1), page 363-370. IEEE Computer Society, (2013)978-1-4799-2143-0.Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications., and . APSEC (1), page 223-230. IEEE Computer Society, (2013)978-1-4799-2143-0.Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications., and . Software Engineering Research and Practice, page 522-528. CSREA Press, (2010)On Formalization of the Whole-Part Relationship in the Unified Modeling Language., , and . IEEE Trans. Software Eng., 29 (11): 1054-1055 (2003)Systematic Transformation of Functional Analysis Model into OO Design and Implementation., , and . IEEE Trans. Software Eng., 32 (2): 111-135 (2006)Mining key and referential constraints enforcement patterns., , and . SAC, page 850-854. ACM, (2014)