Loading…
Predicting common web application vulnerabilities from input validation and sanitization code patterns
Shar, Lwin Khin, Tan, Hee Beng Kuan
Published in 27th IEEE/ACM International Conference on Automated Software Engineering (ASE) : proceedings, September 3-7, 2012, Essen, Germany (03.09.2012)
Published in 27th IEEE/ACM International Conference on Automated Software Engineering (ASE) : proceedings, September 3-7, 2012, Essen, Germany (03.09.2012)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Supporting oracle construction via static analysis
Junjie Chen, Yanwei Bai, Dan Hao, Lingming Zhang, Lu Zhang, Bing Xie, Hong Mei
Published in Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (01.09.2016)
Published in Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (01.09.2016)
Get full text
Conference Proceeding
Loading…
Loading…
A novel variable-centric fault localization technique
Kim, Jeongho, Kim, Jindae, Lee, Eunseok
Published in Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings (27.05.2018)
Published in Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings (27.05.2018)
Get full text
Conference Proceeding
Loading…
Causal Program Slicing
Gore, Ross, Reynolds Jr, Paul F.
Published in 2009 ACM/IEEE/SCS 23rd Workshop on Principles of Advanced and Distributed Simulation (22.06.2009)
Published in 2009 ACM/IEEE/SCS 23rd Workshop on Principles of Advanced and Distributed Simulation (22.06.2009)
Get full text
Conference Proceeding
Loading…
Test case permutation to improve execution time
Stratis, Panagiotis, Rajan, Ajitha
Published in Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (01.09.2016)
Published in Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (01.09.2016)
Get full text
Conference Proceeding
Loading…
Research and Markets: Guidance For The Verification And Validation Of Neural Networks Report Is Available Now
Published in M2 Presswire
(27.04.2007)
Get full text
Newsletter
Loading…
Does Code Coverage Provide a Good Stopping Rule for Operational Profile Based Testing?
Miranda, Breno, Bertolino, Antonia
Published in 2016 IEEE/ACM 11th International Workshop in Automation of Software Test (AST) (01.05.2016)
Published in 2016 IEEE/ACM 11th International Workshop in Automation of Software Test (AST) (01.05.2016)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Creating a reference technology platform: Performing model-based safety analysis in a heterogeneous development environment
Kacimi, Omar, Ellen, Christian, Oertel, Markus, Sojka, Daniel
Published in 2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD) (01.01.2014)
Get full text
Published in 2014 2nd International Conference on Model-Driven Engineering and Software Development (MODELSWARD) (01.01.2014)
Conference Proceeding
Loading…
A general approach for expressing infeasibility in Implicit Path Enumeration Technique
Raymond, Pascal
Published in 2014 proceedings of the International Conference on Embedded Software (EMSOFT) : October 12-17, 2014, Jaypee Greens Golf and Spa Resort, New Delhi, India (01.10.2014)
Published in 2014 proceedings of the International Conference on Embedded Software (EMSOFT) : October 12-17, 2014, Jaypee Greens Golf and Spa Resort, New Delhi, India (01.10.2014)
Get full text
Conference Proceeding
Loading…
Loading…
Purchase Intention Based Model for a Behavioural Simulation of Sale Space
Sylvain, Antoine, Doniec, Arnaud, Mandiau, Rene, Lecoeuche, Stephane
Published in 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) (01.08.2014)
Published in 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) (01.08.2014)
Get full text
Conference Proceeding
Loading…
A synergetic approach to accurate analysis of cache-related preemption delay
Kleinsorge, Jan C., Falk, Heiko, Marwedel, Peter
Published in Proceedings of the ninth ACM International Conference on Embedded Software (09.10.2011)
Published in Proceedings of the ninth ACM International Conference on Embedded Software (09.10.2011)
Get full text
Conference Proceeding
Loading…
Attention Manipulation for Naval Tactical Picture Compilation
Bosse, Tibor, Lambalgen, Rianne van, Maanen, Peter-Paul van, Treur, Jan
Published in Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02 (15.09.2009)
Published in Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 02 (15.09.2009)
Get full text
Conference Proceeding
Loading…
Intrusion detection using signatures extracted from execution profiles
El-Ghali, M., Masri, W.
Published in 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Published in 2009 ICSE Workshop on Software Engineering for Secure Systems (19.05.2009)
Get full text
Conference Proceeding