Author of the publication

Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities.

, , , and . SCAM, page 79-84. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Selecting the minimal set of preferred responses to counter detected intrusions., , and . CISRC, page 5:1-5:8. ACM, (2017)Representing and Reasoning with Qualitative Preferences for Compositional Systems., , and . CoRR, (2014)Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities., , , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 209-230. Springer, (2017)Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark., , and . ICST, page 484-491. IEEE Computer Society, (2017)Verifying Intervention Policies to Counter Infection Propagation over Networks: A Model Checking Approach., , , and . AAAI, page 1408-1414. AAAI Press, (2011)A Knowledge Based Framework for Case-specific Diagnosis., , , and . ICAART (2), page 482-488. SciTePress, (2015)CRISNER: A Practically Efficient Reasoner for Qualitative Preferences., , and . CoRR, (2015)FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis., , and . ICISS, volume 9478 of Lecture Notes in Computer Science, page 171-191. Springer, (2015)Pavement Life-Cycle Sustainability Assessment and Interpretation Using a Novel Qualitative Decision Procedure., and . J. Comput. Civ. Eng., 27 (5): 544-554 (2013)Representing and Reasoning with Multi-Stakeholder Qualitative Preference Queries., , , and . ECAI, volume 372 of Frontiers in Artificial Intelligence and Applications, page 206-213. IOS Press, (2023)