Automated Testing for SQL Injection Vulnerabilities: An Input Mutation Approach
Automatic Checking of Conformance to Requirements Boilerplates
OCLR: A More Expressive, Pattern-Based Temporal Extension of OCL
Making Model-Driven Verification Practical and Scalable: Experiences and Lessons Learned
Model Based Test Validation and Oracles for Data Acquisition Systems
MiL Testing of Highly Configurable Continuous Controllers
Automated detection and resolution of legal cross references
Improving Requirements Glossary Construction via Clustering
Worst-Case Scheduling of Software Tasks
A Scalable Approach for Malware Detec2on through Bounded Feature Space Behavior Modeling
Scalable and Cost-Effective Model-Based Software Verification and Testing
Research-Based Innovation with Industry: Project Experience and Lessons Learned
Identifying Optimal Trade-Offs between CPU Time Usage and Temporal Constraints
Software Engineering Research: Leading a Double-Agent Life.
Minimizing CPU Shortage Risks in Integrated Embedded Software
Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Program Analysis
Using UML for Modeling Procedural Legal Rules
Keynote SBST 2014 - Search-Based Testing
Generating Complex and Faulty Test Data Through Model-Based Mutation Analysis
Behind an Application Firewall, Are we Safe from SQL Injection Attacks?