Author of the publication

On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study.

, , , , , and . EDCC, page 121-128. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Worm-IT - A wormhole-based intrusion-tolerant group communication system., , , and . J. Syst. Softw., 80 (2): 178-197 (2007)Low complexity Byzantine-resilient consensus., , , and . Distributed Comput., 17 (3): 237-249 (2005)On Byzantine generals with alternative plans., , and . J. Parallel Distributed Comput., 68 (9): 1291-1296 (2008)RITAS: Services for Randomized Intrusion Tolerance., , , and . IEEE Trans. Dependable Secur. Comput., 8 (1): 122-136 (2011)When 3f+1 Is Not Enough: Tradeoffs for Decentralized Asynchronous Byzantine Consensus., , , , and . DISC, volume 4731 of Lecture Notes in Computer Science, page 480-481. Springer, (2007)Greft: Arbitrary Fault-Tolerant Distributed Graph Processing., , and . BigData Congress, page 452-459. IEEE Computer Society, (2015)Pando: Personal Volunteer Computing in Browsers., , , and . Middleware, page 96-109. ACM, (2019)Efficient Byzantine Fault-Tolerance., , , , and . IEEE Trans. Computers, 62 (1): 16-30 (2013)MultiTLS: Secure communication channels with cipher suite diversity., , , and . IACR Cryptol. ePrint Arch., (2020)μVerum: Intrusion Recovery for Microservice Applications., , , and . IEEE Access, (2023)