Author:
Marashdih Abdalla Wasef,Zaaba Zarul Fitri
Reference34 articles.
1. Da Fonseca, Martin, J. C. C. and Vieira, M. P. A. “A practical experience on the impact of plugins in web security,” in 2014 IEEE 33rd International Symposium on Reliable Distributed Systems (SRDS), pp. 21–30.
2. Basic concepts and taxonomy of dependable and secure computing
3. Marashdih, A. W. and Zaaba, Z. F. “Cross Site Scripting: Detection Approaches in Web Application,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 10, Oct. 2016.
4. Hedley, D. and Hennell, M. A. “The causes and effects of infeasible paths in computer programs,” in 1985 Proceedings of the 8th international conference on Software engineering, pp. 259–266.
5. Papadakis M. and Malevris, N. “A symbolic execution tool based on the elimination of infeasible paths,” in 2010 Fifth International Conference on Software Engineering Advances (ICSEA), pp. 435–440.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Generating Feasible Path Between Path Testing and Data Flow Testing;Evolutionary Computing and Mobile Sustainable Networks;2020-08-01
2. Automatic support for the identification of infeasible testing requirements;Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis;2020-07-13