Author of the publication

Execution Trace Analysis Using LTL-FO ^+.

, , and . ISoLA (2), volume 9953 of Lecture Notes in Computer Science, page 356-362. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Alternating Automaton for First-Order Linear Temporal Logic-Tech Report., , and . CoRR, (2016)A Few Things We Heard About RV Tools (Position Paper)., , and . RV-CuBES, volume 3 of Kalpa Publications in Computing, page 89-95. EasyChair, (2017)Employing Feature Selection to Improve the Performance of Intrusion Detection Systems., , , and . FPS, volume 13291 of Lecture Notes in Computer Science, page 93-112. Springer, (2021)Are Backdoor Mandates Ethical? - A Position Paper., and . IEEE Technol. Soc. Mag., 41 (4): 63-70 (2022)Decentralized Enforcement of Artifact Lifecycles., , , and . EDOC, page 1-10. IEEE Computer Society, (2016)Using Equivalence Relations for Corrective Enforcement of Security Policies., and . MMM-ACNS, volume 6258 of Lecture Notes in Computer Science, page 139-154. Springer, (2010)Runtime Enforcement with Partial Control., and . FPS, volume 9482 of Lecture Notes in Computer Science, page 102-116. Springer, (2015)SealTest: a simple library for test sequence generation., and . ISSTA, page 392-395. ACM, (2017)Empirical study of android repackaged applications., , , and . Empir. Softw. Eng., 24 (6): 3587-3629 (2019)A Taxonomy of Software Flaws Leading to Buffer Overflows.. QRS, page 1-8. IEEE, (2022)