Kamu erişimi zorunlu olan makaleler - Julian ThomeDaha fazla bilgi edinin
Bir yerde sunuluyor: 5
Search-driven string constraint solving for vulnerability detection
J Thome, LK Shar, D Bianculli, L Briand
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
Zorunlu olanlar: Luxembourg National Research Fund
Search-based security testing of web applications
J Thome, A Gorla, A Zeller
Proceedings of the 7th International workshop on search-based software …, 2014
Zorunlu olanlar: European Commission
Security slicing for auditing common injection vulnerabilities
J Thome, LK Shar, D Bianculli, L Briand
Journal of Systems and Software 137, 766-783, 2018
Zorunlu olanlar: Luxembourg National Research Fund
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
J Thome, LK Shar, D Bianculli, L Briand
IEEE Transactions on Software Engineering 46 (2), 163-195, 2018
Zorunlu olanlar: Luxembourg National Research Fund
Joanaudit: A tool for auditing common injection vulnerabilities
J Thome, LK Shar, D Bianculli, LC Briand
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
Zorunlu olanlar: Luxembourg National Research Fund
Yayıncılık ve maddi kaynak bilgileri otomatik olarak bir bilgisayar programı tarafından belirlenmektedir