ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
2
views
0
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,110
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis
proceedings-article
Author(s):
Lwin Khin Shar
,
Hee Beng Kuan Tan
,
Lionel C. Briand
Publication date
(Print):
May 2013
Publisher:
IEEE
Conference name:
2013 35th International Conference on Software Engineering (ICSE)
Conference date:
June 18, 2013 - June 26, 2013
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH doi match)
oa repository (via OAI-PMH title and first author match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
iGEM
Author and article information
Conference
Publisher:
IEEE
Publication date:
May 2013
Publication date (Print):
May 2013
Pages
: 642-651
Article
DOI:
10.1109/ICSE.2013.6606610
SO-VID:
68144686-d033-401d-b8b8-2b4a4a49079d
Copyright ©
© 2013
Conference name:
2013 35th International Conference on Software Engineering (ICSE)
Conference location:
San Francisco, CA, USA
Conference date:
June 18, 2013 - June 26, 2013
History
ScienceOpen disciplines:
Quantitative & Systems biology
,
Biophysics
Data availability:
ScienceOpen disciplines:
Quantitative & Systems biology
,
Biophysics
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,110
Victims' routine activities and sex offenders' target selection scripts: a latent class analysis.
Authors:
Nadine Deslauriers‐Varin
,
Eric Beauregard
Scripts for TRUMP data analyses. Part II (HLA-related data): statistical analyses specific for hematopoietic stem cell transplantation
Authors:
Junya Kanda
Light-front transverse momentum distributions for J=1/2 hadronic systems in valence approximation
Authors:
Rocco T. Alessandro
,
Alessio Del Dotto
,
Emanuele Pace
…
See all similar
Cited by
8
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques : A Survey
Authors:
Seyed Mohammad Ghaffarian
,
Hamid Shahriari
AI-Based Mobile Edge Computing for IoT: Applications, Challenges, and Future Scope
Authors:
Ashish Singh
,
Suresh Satapathy
,
Arnab Roy
…
Using a Prediction Model to Manage Cyber Security Threats
Authors:
Venkatesh Jaganathan
,
Priyesh Cherurveettil
,
Premapriya Muthu Sivashanmugam
See all cited by