Cited By
View all- Alves HFonseca BAntunes N(2016)Experimenting Machine Learning Techniques to Predict Vulnerabilities2016 Seventh Latin-American Symposium on Dependable Computing (LADC)10.1109/LADC.2016.32(151-156)Online publication date: Oct-2016
- Matsunaga AAntunes NMoraes R(2016)Coverage Metrics and Detection of Injection Vulnerabilities: An Experimental Study2016 12th European Dependable Computing Conference (EDCC)10.1109/EDCC.2016.32(45-52)Online publication date: Sep-2016
- Dao TShibayama E(2011)Security sensitive data flow coverage criterion for automatic security testing of web applicationsProceedings of the Third international conference on Engineering secure software and systems10.5555/1946341.1946352(101-113)Online publication date: 9-Feb-2011
- Show More Cited By