Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimators for Fault Tolerance Coverage Evaluation., , , and . IEEE Trans. Computers, 44 (2): 261-274 (1995)Uso da ferramenta de testes fSofist na validação de uma aplicação espacial., , and . JIISIC, page 179-188. (2002)A security configuration assessment for android devices., , and . SAC, page 2299-2304. ACM, (2015)Architecture-Centric Fault Tolerance with Exception Handling., , , and . LADC, volume 4746 of Lecture Notes in Computer Science, page 75-94. Springer, (2007)Architecting Fault Tolerance with Exception Handling: Verification and Validation., , , and . J. Comput. Sci. Technol., 24 (2): 212-237 (2009)Estimators for Fault Tolerance Coverage Evaluation., , , and . FTCS, page 228-237. IEEE Computer Society, (1993)A Method for Model Based Test Harness Generation for Component Testing., and . J. Braz. Comput. Soc., 14 (1): 7-23 (2008)The Perils of Android Security Configuration., , and . Computer, 49 (6): 15-21 (2016)Component-Based Software Certification Based on Experimental Risk Assessment., , , and . LADC, volume 4746 of Lecture Notes in Computer Science, page 179-197. Springer, (2007)Risk Assessment of User-Defined Security Configurations for Android Devices., , and . ISSRE, page 467-477. IEEE Computer Society, (2016)