Author:
Almorsy Mohamed,Grundy John,Ibrahim Amani S.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Analysis of Vulnerabilities in College Web-Based System;Electronics;2024-06-08
2. Automatic Security-Flaw Detection Replication and Comparison;2023 ACM/IEEE 26th International Conference on Model Driven Engineering Languages and Systems (MODELS);2023-10-01
3. Structured Specification Framework for the Attacks, Weaknesses, and Vulnerabilities of Vehicle E&E systems;2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring);2023-06
4. Adapting Static Taint Analyzers to Software Marketplaces;Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses;2022-11-08
5. What are the critical security flaws in my system?;Proceedings of the 20th ACM SIGPLAN International Workshop on Erlang;2021-08-18