Information Technology Reference
In-Depth Information
6. Collins, M., Duffy, N.: New ranking algorithms for parsing and tagging: kernels over
discrete structures, and the voted perceptron. In: Proceedings of the 40th Annual
Meeting on Association for Computational Linguistics, ACL 2002, pp. 263-270.
Association for Computational Linguistics, Stroudsburg (2002),
http://dx.doi.org/10.3115/1073083.1073128
7. Cordy, J.: The TXL source transformation language. Science of Computer Pro-
gramming 61(3), 190-210 (2006)
8. Halfond, W.G.J., Choudhary, S.R., Orso, A.: Improving penetration testing
through static and dynamic analysis. Software Testing, Verification and Reliabil-
ity 21(3), 195-214 (2011)
9. Huang, Y.W., Tsai, C.H., Lee, D., Kuo, S.Y.: Non-detrimental web application
security scanning. In: 15th International Symposium on Software Reliability Engi-
neering, ISSRE 2004, pp. 219-230 (November 2004)
10. Jovanovic, N., Kruegel, C., Kirda, E.: Pixy: A static analysis tool for detecting
web application vulnerabilities (short paper). In: SP 2006: Proceedings of the 2006
IEEE Symposium on Security and Privacy, pp. 258-263. IEEE Computer Society,
Washington, DC (2006)
11. Kals, S., Kirda, E., Kruegel, C., Jovanovic, N.: Secubat: a web vulnerability scan-
ner. In: Proceedings of the 15th International Conference on World Wide Web,
WWW 2006, pp. 247-256. ACM, New York (2006)
12. Kieyzun, A., Guo, P., Jayaraman, K., Ernst, M.: Automatic creation of sql injection
and cross-site scripting attacks. In: IEEE 31st International Conference on Software
Engineering, ICSE 2009, pp. 199-209 (May 2009)
13. McAllister, S., Kirda, E., Kruegel, C.: Leveraging user interactions for in-depth
testing of web applications. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.)
RAID 2008. LNCS, vol. 5230, pp. 191-210. Springer, Heidelberg (2008)
14. Moschitti, A.: Ecient convolution kernels for dependency and constituent syn-
tactic trees. In: Furnkranz, J., Scheffer, T., Spiliopoulou, M. (eds.) ECML 2006.
LNCS (LNAI), vol. 4212, pp. 318-329. Springer, Heidelberg (2006)
15. Severyn, A., Moschitti, A.: Large-scale support vector learning with structural
kernels. In: Balcazar, J.L., Bonchi, F., Gionis, A., Sebag, M. (eds.) ECML PKDD
2010, Part III. LNCS (LNAI), vol. 6323, pp. 229-244. Springer, Heidelberg (2010)
16. Sharir, M., Pnueli, A.: Two approaches to interprocedural data flow analysis.
In: Program Flow Analysis: Theory and Applications, pp. 189-233. Prentice Hall
(1981)
17. Surribas, N.: Wapiti, web application vulnerability scanner/security auditor (2006-
2010), http://www.ict-romulus.eu/web/wapiti
18. Tappenden, A., Beatty, P., Miller, J., Geras, A., Smith, M.: Agile security testing
of web-based systems via httpunit. In: Proceedings of the Agile Conference, pp.
29-38 (July 2005)
19. Vishwanathan, S., Smola, A.: Fast kernels on strings and trees. In: Proceedings of
Neural Information Processing Systems (2002)
20. Wassermann, G., Su, Z.: Static detection of cross-site scripting vulnerabilities. In:
ICSE 2008: Proceedings of the 30th International Conference on Software Engi-
neering, pp. 171-180. ACM, New York (2008)
21. Zhang, D., Lee, W.S.: Question classification using support vector machines. In:
Proceedings of the 26th Annual International ACM SIGIR Conference on Research
and Development in Informaion Retrieval, SIGIR 2003, pp. 26-32. ACM, New York
(2003), http://doi.acm.org/10.1145/860435.860443
 
 
Search WWH ::




Custom Search