swMATH37817MaRDI QIDQ53518FDOQ53518
Author name not available (Why is that?)
Official website: https://ieeexplore.ieee.org/abstract/document/4531166
Cited In (23)
- Symbolic String Verification: Combining String Analysis and Size Analysis
- Context-oriented web application protection model
- StringFuzz
- Equivalence of finite-valued symbolic finite transducers
- String theories involving regular membership predicates: from practice to theory and back
- Towards more efficient methods for solving regular-expression heavy string constraints
- Stranger
- AMNESIA
- CSSV
- Symbolic automata
- Snort
- LIFT
- Sigma*
- Fable
- Merlin
- Pixy
- Z3str2
- TAJ
- Dynamic management of capabilities in a network aware coordination language
- Bex
- A survey on server-side approaches to securing web applications
- Automata-based symbolic string analysis for vulnerability detection
- Symbolic string transformations with regular lookahead and rollback
This page was built for software: Saner