Login / Signup
Automated testing for SQL injection vulnerabilities: an input mutation approach.
Dennis Appelt
Cu Duy Nguyen
Lionel C. Briand
Nadia Alshahwan
Published in:
ISSTA (2014)
Keyphrases
</>
security vulnerabilities
sql injection
genetic algorithm
evolutionary algorithm
differential evolution
computer systems
countermeasures
web applications
information security
sql injection attacks