Cited By
View all- Brun YLin TSomerville JMyers EEbner N(2023)Blindspots in Python and Java APIs Result in Vulnerable CodeACM Transactions on Software Engineering and Methodology10.1145/357185032:3(1-31)Online publication date: 26-Apr-2023
- Yang YWang LGu JLi Y(2023)Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code InstrumentationIEEE Transactions on Services Computing10.1109/TSC.2022.314994916:2(996-1010)Online publication date: 1-Mar-2023
- Ma JZuo GLoughlin KZhang HQuinn AKasikci BFalsafi BFerdman MLu SWenisch T(2022)Debugging in the brave new world of reconfigurable hardwareProceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3503222.3507701(946-962)Online publication date: 28-Feb-2022
- Show More Cited By