Sfoglia per Rivista
Security analysis of permission re-delegation vulnerabilities in Android apps
2020-01-01 Demissie, Biniam Fisseha; Ceccato, Mariano; Shar, Lwin Khin
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
2019-01-01 Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn
Using search-based algorithms for Ajax event sequence generation during testing
2011-01-01 Marchetto, Alessandro; Tonella, Paolo
Weighing lexical information for software clustering in the context of architecture recovery
2016-01-01 Anna, Corazza; Sergio Di, Martino; Maggio, Valerio; Giuseppe, Scanniello
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Security analysis of permission re-delegation vulnerabilities in Android apps | 1-gen-2020 | Demissie, Biniam Fisseha; Ceccato, Mariano; Shar, Lwin Khin | |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge | 1-gen-2019 | Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn | |
Using search-based algorithms for Ajax event sequence generation during testing | 1-gen-2011 | Marchetto, Alessandro; Tonella, Paolo | |
Weighing lexical information for software clustering in the context of architecture recovery | 1-gen-2016 | Anna, Corazza; Sergio Di, Martino; Maggio, Valerio; Giuseppe, Scanniello |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile