Author of the publication

Tame Your Annotations with MetAcsl: Specifying, Testing and Proving High-Level Properties.

, , , , and . TAP, volume 11823 of Lecture Notes in Computer Science, page 167-185. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tame Your Annotations with MetAcsl: Specifying, Testing and Proving High-Level Properties., , , , and . TAP, volume 11823 of Lecture Notes in Computer Science, page 167-185. Springer, (2019)Vigne: Towards a Self-healing Grid Operating System.. Euro-Par, volume 4128 of Lecture Notes in Computer Science, page 437-447. Springer, (2006)Towards Enforcement of the EU GDPR: Enabling Data Erasure., , , and . iThings/GreenCom/CPSCom/SmartData, page 222-229. IEEE, (2018)MetAcsl: Specification and Verification of High-Level Properties., , , , and . CoRR, (2018)Reactive and Adaptive Security Monitoring in Cloud Computing., , and . FAS*W@SASO/ICAC, page 5-7. IEEE, (2018)Fighting N-day vulnerabilities with automated CVSS vector prediction at disclosure., , and . ARES, page 26:1-26:10. ACM, (2020)Blockchain as a Trusted Component in Cloud SLA Verification., , , and . UCC Companion, page 93-100. ACM, (2019)Simulating the Network Environment of Sandboxes to Hide Virtual Machine Introspection Pauses., , , and . EuroSec@EUROSYS, page 1-7. ACM, (2024)Automated Keyword Extraction from Öne-day" Vulnerabilities at Disclosure., , and . NOMS, page 1-9. IEEE, (2020)SLA definition for network intrusion detection systems in IaaS clouds., , and . SAC, page 40-49. ACM, (2021)