|
Search the dblp DataBase
Yao-Wen Huang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Fang Yu, Chung-Hung Tsai, Yao-Wen Huang, D. T. Lee, Hung-Yau Lin, Sy-Yen Kuo
Efficient Exact Spare Allocation via Boolean Satisfiability. [Citation Graph (0, 0)][DBLP] DFT, 2005, pp:361-370 [Conf]
- Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo
Verifying Web Applications Using Bounded Model Checking. [Citation Graph (0, 0)][DBLP] DSN, 2004, pp:199-208 [Conf]
- Fang Yu, Bow-Yaw Wang, Yao-Wen Huang
Bounded Model Checking for Region Automata. [Citation Graph (0, 0)][DBLP] FORMATS/FTRTFT, 2004, pp:246-262 [Conf]
- Yao-Wen Huang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo
Non-Detrimental Web Application Security Scanning. [Citation Graph (0, 0)][DBLP] ISSRE, 2004, pp:219-230 [Conf]
- Yao-Wen Huang, Shih-Kun Huang, Tsung-Po Lin, Chung-Hung Tsai
Web application security assessment by fault injection and behavior monitoring. [Citation Graph (0, 0)][DBLP] WWW, 2003, pp:148-159 [Conf]
- Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo
Securing web application code by static analysis and runtime protection. [Citation Graph (0, 0)][DBLP] WWW, 2004, pp:40-52 [Conf]
- Yao-Wen Huang, Chung-Hung Tsai, Tsung-Po Lin, Shih-Kun Huang, D. T. Lee, Sy-Yen Kuo
A testing framework for Web application security assessment. [Citation Graph (0, 0)][DBLP] Computer Networks, 2005, v:48, n:5, pp:739-761 [Journal]
- D. T. Lee, G. C. Lee, Yao-Wen Huang
Knowledge Management for Computational Problem Solving. [Citation Graph (0, 0)][DBLP] J. UCS, 2003, v:9, n:6, pp:563-570 [Journal]
Search in 0.001secs, Finished in 0.002secs
|