Showing
1 - 11
results of
11
for search '
BRIAND, Lionel
'
Skip to content
AUNILO IRDS | AUNILO Institutional Repository Discovery Service
FAQs
|
Search Tips
|
Feedback
Your Account
Log Out
Login
Theme
Bootstrap
Aunilo
Language
English
中文(繁體)
اللغة العربية
Toggle navigation
Home
Search/Browse Options
Search History
Advanced Search
About
About AUNILO IRDS
Content Sources
Statistics
Technical Team
Disclaimer
Privacy & Security Policy
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
BRIAND, Lionel
Showing
1 - 11
results of
11
for search '
BRIAND, Lionel
'
, query time: 0.03s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Security slicing for auditing XML, XPath, and SQL injection vulnerabilities
by
THOME, Julian
,
SHAR, Lwin Khin
,
BRIAND
,
Lionel
Published 2015
Get full text
Get full text
text
Save to List
Saved in:
2
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
by
Thome, Julian
,
Shar, Lwin Khin
,
Bianculli, Domenico
,
Briand
,
Lionel
Published 2021
Get full text
Article
Save to List
Saved in:
3
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
by
THOME, Julian
,
SHAR, Lwin Khin
,
BIANCULLI, Domenico
,
BRIAND
,
Lionel
Published 2018
Get full text
Get full text
text
Save to List
Saved in:
4
Security slicing for auditing common injection vulnerabilities
by
THOME, Julian
,
SHAR, Lwin Khin
,
BIANCULLI, Domenico
,
BRIAND
,
Lionel
Published 2017
Get full text
Get full text
text
Save to List
Saved in:
5
Web application vulnerability prediction using hybrid program analysis and machine learning
by
SHAR, Lwin Khin
,
BRIAND
,
Lionel
,
TAN, Hee Beng Kuan
Published 2014
Get full text
Get full text
text
Save to List
Saved in:
6
JoanAudit: A tool for auditing common injection vulnerabilities
by
THOME, Julian
,
SHAR, Lwin Khin
,
BIANCULLI, Domenico
,
BRIAND
,
Lionel
Published 2017
Get full text
Get full text
text
Save to List
Saved in:
7
Search-driven string constraint solving for vulnerability detection
by
THOME, Julian
,
SHAR, Lwin Khin
,
BIANCULLI, Domenico
,
BRIAND
,
Lionel
Published 2017
Get full text
Get full text
text
Save to List
Saved in:
8
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
by
SHAR, Lwin Khin
,
TAN, Hee Beng Kuan
,
BRIAND
,
Lionel
C.
Published 2013
Get full text
Get full text
text
Save to List
Saved in:
9
Automated reverse engineering of role-based access control policies of web applications
by
LE, Ha Thanh
,
SHAR, Lwin Khin
,
BIANCULLI, Domenico
,
BRIAND
,
Lionel
C.
,
NGUYEN, Cu Duy
Published 2022
Get full text
Get full text
text
Save to List
Saved in:
10
Modeling security and privacy requirements: A use case-driven approach
by
MAI, Phu Xuan
,
GOKNIL, Arda
,
SHAR, Lwin Khin
,
PASTORE, Fabrizio
,
BRIAND
,
Lionel
,
SHAAME, Shaban
Published 2018
Get full text
Get full text
text
Save to List
Saved in:
11
A scalable approach for malware detection through bounded feature space behavior modeling
by
CHANDRAMOHAN, Mahinthan
,
TAN, Hee Beng Kuan
,
BRIAND
,
Lionel
C
,
SHAR, Lwin Khin
,
PADMANABHUNI, Bindu Madhavi
Published 2013
Get full text
Get full text
text
Save to List
Saved in:
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...