Author:
Antunes Nuno,Vieira Marco
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vulnerabilities That Threaten Web Applications in Afghanistan;Springer Proceedings in Complexity;2024
2. Taxonomy of SQL Injection: ML Trends & Open Challenges;2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS);2023-08-25
3. A critical comparison on six static analysis tools: Detection, agreement, and precision;Journal of Systems and Software;2023-04
4. Generating realistic vulnerabilities via neural code editing: an empirical study;Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2022-11-07
5. Understanding the How and the Why;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07