![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Gauthier, F., Letarte, D., Lavoie, T., & Merlo, E. (2011, July). Extraction and comprehension of moodle's access control model: A case study [Paper]. 9th Annual International Conference on Privacy, Security and Trust, Montréal, Québec. External link
Letarte, D., Gauthier, F., Merlo, E., Sutyanyong, N., & Zuzarte, C. (2012, May). Targeted genetic test SQL generation for the DB2 database [Paper]. 5th International Workshop on Testing Database Systems (DBTest 2012), Scottsdale, Arizona, USA. External link
Letarte, D. (2011). Détection, protection, évolution et test de défaillances à l'aide d'un modèle inter-procédural simple [Ph.D. thesis, École Polytechnique de Montréal]. Available
Letarte, D., Gauthier, F., & Merlo, E. (2011, March). Security model evolution of PHP web applications [Paper]. 4th IEEE International Conference on Software Testing, Verification, and Validation (ICST 2011), Berlin, Germany. External link
Letarte, D. (2010, September). Conversion of fast inter-procedural static analysis to model checking [Paper]. IEEE 26th International Conference on Software Maintenance (ICSM 2010), Timisoara, Romania. External link
Letarte, D. (2010, September). Model checking graph representation of precise boolean inter-procedural flow analysis [Paper]. 25th IEEE/ACM International Conference on Automated Software Engineering, ASE'10, Antwerp, Belgium. External link
Letarte, D., & Merlo, E. (2009, October). Extraction of inter-procedural simple role privilege models from PHP code [Paper]. 16th Working Conference on Reverse Engineering, Lille, France. External link
Letarte, D. (2006). Identification de méthodes pour l'évaluation des grammaires de langues naturelles [Master's thesis, École Polytechnique de Montréal]. Available
Merlo, E., Letarte, D., & Antoniol, G. (2007, March). Automated protection of php applications against SQL-injection attacks [Paper]. 11th European Conference on Software Maintenance and Reengineering (CSMR 2007), Amsterdam, Netherlands. External link
Merlo, E., Letarte, D., & Antoniol, G. (2007, October). SQL-injection security evolution analysis in PHP [Paper]. 9th IEEE International Symposium on Web Site Evolution (WSE 2007), Paris, France. External link
Merlo, E., Letarte, D., & Antoniol, G. (2006). Insider threat resistant SQL-injection prevention in PHP. (Technical Report n° EPM-RT-2006-04). Available
Merlo, E., Letarte, D., & Antoniol, G. (2006, October). Insider and outsider threat-sensitive SQL injection vulnerability analysis in PHP [Paper]. 13th Working Conference on Reverse Engineering (WCRE 2006), Benevento, Italy. External link