Author of the publication

Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration.

, , , , and . CSIIRW, page 43. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing the behavior of malware., , , and . CSIIRW, page 36. ACM, (2010)Eliminating non-traversable paths from structured programs., , and . ICSM, page 156-164. IEEE Computer Society, (1992)Function Extraction (FX) Technology: Automated Calculation of Program Behavior for High-Assurance Systems., and . HASE, page 267-268. IEEE Computer Society, (2004)Controlling Combinatorial Complexity in Software and Malware Behavior Computation., and . CISR, page 15:1-15:4. ACM, (2015)Classification Using Information., , and . GOSLER Final Report, volume 961 of Lecture Notes in Computer Science, page 162-173. Springer, (1995)Learning vi Queries in +, <., , and . J. Symb. Log., 57 (1): 53-81 (1992)Improving Network System Security with Function Extraction Technology for Automated Calculation of Program Behavior., and . HICSS, IEEE Computer Society, (2004)Classification Using Information., , and . AII/ALT, volume 872 of Lecture Notes in Computer Science, page 290-300. Springer, (1994)The incremental development process in Cleanroom software engineering., , , and . Decis. Support Syst., 17 (1): 55-71 (1996)Learning via Queries to an Oracle., and . COLT, page 214-229. Morgan Kaufmann, (1989)