Author of the publication

Recycling Test Cases to Detect Security Vulnerabilities.

, and . ISSRE, page 231-240. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intercept: Profiling Windows Network Device Drivers., and . EWDC, volume 7869 of Lecture Notes in Computer Science, page 61-75. Springer, (2013)When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus., , , , and . DISC, volume 4731 of Lecture Notes in Computer Science, page 480-481. Springer, (2007)Worm-IT - A wormhole-based intrusion-tolerant group communication system., , , and . J. Syst. Softw., 80 (2): 178-197 (2007)Low complexity Byzantine-resilient consensus., , , and . Distributed Comput., 17 (3): 237-249 (2005)RITAS: Services for Randomized Intrusion Tolerance., , , and . IEEE Trans. Dependable Secur. Comput., 8 (1): 122-136 (2011)Tolerating Intrusions in Grid Systems., , and . Security and Management, page 207-220. CSREA Press, (2004)Efficient Byzantine-Resilient Reliable Multicast on a Hybrid Failure Model., , , and . SRDS, page 2-11. IEEE Computer Society, (2002)Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available., , , and . SRDS, page 71-82. IEEE Computer Society, (2006)Resilient State Machine Replication., , and . PRDC, page 305-309. IEEE Computer Society, (2005)Fault Detection Using Hints from the Socket Layer., and . SRDS, page 64-71. IEEE Computer Society, (1997)