Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective Fault Treatment for Improving the Dependability of COTS and Legacy-Based Applications., , , and . IEEE Trans. Dependable Secur. Comput., 1 (4): 223-237 (2004)Towards Cognitive Security Defense from Data., , and . DSN (Supplements), page 11-12. IEEE, (2019)Dependability Assessment of the Android OS through Fault Injection., , , and . CoRR, (2019)Privacy Preserving Intrusion Detection Via Homomorphic Encryption., , , , , , and . WETICE, page 321-326. IEEE, (2019)Who Evaluates the Evaluators? On Automatic Metrics for Assessing AI-based Offensive Code Generators., , , , and . CoRR, (2022)A comprehensive study on software aging across android versions and vendors., , , and . Empir. Softw. Eng., 25 (5): 3357-3395 (2020)Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study., , , and . CoRR, (2022)Virtualizing Mixed-Criticality Systems: A Survey on Industrial Trends and Issues., , , and . CoRR, (2021)Building a dependable system from a legacy application with CORBA., , , and . J. Syst. Archit., 48 (1-3): 81-98 (2002)Automating the Correctness Assessment of AI-generated Code for Security Contexts., , , , and . CoRR, (2023)