Cited By
View all- Zhang BLi JRen JHuang G(2021)Efficiency and Effectiveness of Web Application Vulnerability Detection Approaches: A ReviewACM Computing Surveys10.1145/347455354:9(1-35)Online publication date: 8-Oct-2021
- Liu ZZhao HLi SLi QWei TWang YCao JHo Au MLin ZYung M(2021)Privilege-Escalation Vulnerability Discovery for Large-scale RPC ServicesProceedings of the 2021 ACM Asia Conference on Computer and Communications Security10.1145/3433210.3453076(565-577)Online publication date: 24-May-2021
- Ben Fadhel ABianculli DBriand LHuchard MKästner CFraser G(2018)Model-driven run-time enforcement of complex role-based access control policiesProceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering10.1145/3238147.3238167(248-258)Online publication date: 3-Sep-2018
- Show More Cited By