共 50 条
- [41] A Search-based Testing Approach for XML Injection Vulnerabilities in Web Applications 2017 10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2017, : 356 - 366
- [42] Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 230 - 239
- [44] Detecting Vulnerabilities in Service Oriented Architectures 23RD IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSRE 2012), 2012, : 134 - 139
- [45] Detecting Security Vulnerabilities with Vulnerability Nets 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY, AND SECURITY COMPANION, QRS-C, 2022, : 375 - 383
- [46] Detecting Unknown Vulnerabilities Using Honeynet 2015 FIRST INTERNATIONAL CONFERENCE ON ANTI-CYBERCRIME (ICACC), 2015, : 10 - 13
- [47] Detecting Concurrency Memory Corruption Vulnerabilities ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, 2019, : 706 - 717
- [48] Methodology for detecting vulnerabilities in data networks Franco, D.A. (dfrancob@unicartagena.edu.co), 1600, Centro de Informacion Tecnologica (23):
- [49] Precisely detecting buffer overflow vulnerabilities Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2008, 36 (11): : 2200 - 2204