From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preface., , и . J. Autom. Reason., 45 (2): 89 (2010)Constraint Solving in Logic Programming and in Automated Deduction: A Comparison., , и . AIMSA, том 1480 из Lecture Notes in Computer Science, стр. 28-38. Springer, (1998)An Empirical Evaluation of the Android Security Framework., , и . SEC, том 405 из IFIP Advances in Information and Communication Technology, стр. 176-189. Springer, (2013)Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations., , , , и . CoRR, (2020)Abstraction-Driven SAT-based Analysis of Security Protocols., и . SAT, том 2919 из Lecture Notes in Computer Science, стр. 257-271. Springer, (2003)The eureka tool for software model checking., , , , и . ASE, стр. 541-542. ACM, (2007)On a Rewriting Approach to Satisfiability Procedures: Extension, Combination of Theories and an Experimental Appraisal., , , и . FroCoS, том 3717 из Lecture Notes in Computer Science, стр. 65-80. Springer, (2005)Model Checking of Security-Sensitive Business Processes., и . Formal Aspects in Security and Trust, том 5983 из Lecture Notes in Computer Science, стр. 66-80. Springer, (2009)Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation., , и . Mechanizing Mathematical Reasoning, том 2605 из Lecture Notes in Computer Science, стр. 30-45. Springer, (2005)DIOXIN: runtime security policy enforcement of fog applications., , , и . Int. J. Grid Util. Comput., 12 (2): 126-138 (2021)