Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Case-based reasoning assisted explanation of genetic algorithm results., , and . J. Exp. Theor. Artif. Intell., 5 (1): 21-37 (1993)Security Fatigue? Shift Your Paradigm.. Computer, 47 (3): 81-83 (2014)The Top 10 Risks of Machine Learning Security., , , and . Computer, 53 (6): 57-61 (2020)Roundtable on Information Security Policy., , , , , , , , , and . IEEE Softw., 17 (5): 26-32 (2000)Exploiting Software.. USENIX Security Symposium, USENIX, (2004)Silver Bullet Talks with Jon Callas.. IEEE Secur. Priv., 12 (1): 6-8 (2014)Static Analysis for Security., and . IEEE Secur. Priv., 2 (6): 76-79 (2004)Silver Bullet Talks with the IEEE Center for Secure Design.. IEEE Secur. Priv., 12 (6): 9-12 (2014)Silver Bullet Talks with Annie Antón.. IEEE Secur. Priv., 5 (5): 8-11 (2007)Silver Bullet Talks with Jamie Butler.. IEEE Secur. Priv., 14 (2): 8-10 (2016)