Author:
Ouairy Léopold,Le-Bouder Hélène,Lanet Jean-Louis
Publisher
Springer International Publishing
Reference17 articles.
1. OWASP enterprise security API (2009)
2. Lecture Notes in Computer Science;L Burdy,2003
3. Jones, C.: Systematic Software Development Using VDM, vol. 2. Prentice-Hall, Englewood Cliffs (1986)
4. Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: a static analysis tool for detecting web application vulnerabilities. In: IEEE Symposium on Security and Privacy (2006)
5. Kamel, N.: Sécurité des cartes à puce à serveur web embarqué. Ph.D. thesis, Université of Limoges (2012)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Deep learning techniques to detect cybersecurity attacks: a systematic mapping study;Empirical Software Engineering;2023-05
2. Confiance;Proceedings of the 15th International Conference on Availability, Reliability and Security;2020-08-25