Author:
Alalfi Manar H.,Cordy James R.,Dean Thomas R.
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Project, O.W.A.S.: The Top Ten Most Critical Web Application Security Vulnerabilities,
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
(last access November 26, 2011)
2. Lecture Notes in Computer Science;M. Pistoia,2005
3. Alalfi, M., Cordy, J., Dean, T.: Modeling methods for web application verification and testing: State of the art. Softw. Test. Verif. Reliab. 19, 265–296 (2009)
4. Cordy, J.R.: The TXL source transformation language. Science of Computer Programming 61, 190–210 (2006)
5. Alalfi, M.H., Cordy, J.R., Dean, T.R.: Automated Reverse Engineering of UML Sequence Diagrams for Dynamic Web Applications. In: ICSTW, pp. 295–302 (2009)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献