Author of the publication

Failure classification and analysis of the Java Virtual Machine.

, , and . ICDCS, page 17. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Preserving Intrusion Detection Via Homomorphic Encryption., , , , , , and . WETICE, page 321-326. IEEE, (2019)Dependability Assessment of the Android OS through Fault Injection., , , and . CoRR, (2019)Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications., , , and . IEEE Trans. Dependable Secur. Comput., 1 (4): 223-237 (2004)Towards Cognitive Security Defense from Data., , and . DSN (Supplements), page 11-12. IEEE, (2019)Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study., , , and . CoRR, (2022)Virtualizing Mixed-Criticality Systems: A Survey on Industrial Trends and Issues., , , and . CoRR, (2021)Virtualizing mixed-criticality systems: A survey on industrial trends and issues., , , and . Future Gener. Comput. Syst., (2022)A comprehensive study on software aging across android versions and vendors., , , and . Empir. Softw. Eng., 25 (5): 3357-3395 (2020)Who Evaluates the Evaluators? On Automatic Metrics for Assessing AI-based Offensive Code Generators., , , , and . CoRR, (2022)The Esperanto Broker: a communication platform for nomadic computing systems., , and . Softw. Pract. Exp., 37 (10): 1017-1046 (2007)