Author of the publication

Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark.

, , and . ICST, page 484-491. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Migrant boat mini challenge award: Analysis summary a geo-temporal analysis of the migrant boat dataset., , and . IEEE VAST, page 217-218. IEEE Computer Society, (2008)Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities., , , and . SCAM, page 79-84. IEEE Computer Society, (2016)Interactive visualization toolbox to detect sophisticated android malware., , , and . VizSEC, page 1-8. IEEE Computer Society, (2017)Head-Mounted Display Visualizations to Support Sound Awareness for the Deaf and Hard of Hearing., , , , , , , and . CHI, page 241-250. ACM, (2015)COMB: computing relevant program behaviors., , , , and . ICSE (Companion Volume), page 109-112. ACM, (2018)Human-on-the-Loop Automation for Detecting Software Side-Channel Vulnerabilities., , , and . ICISS, volume 10717 of Lecture Notes in Computer Science, page 209-230. Springer, (2017)Transferring State-of-the-Art Immutability Analyses: Experimentation Toolbox and Accuracy Benchmark., , and . ICST, page 484-491. IEEE Computer Society, (2017)Mockingbird: a framework for enabling targeted dynamic analysis of Java programs., , and . ICSE (Companion Volume), page 39-42. IEEE / ACM, (2019)Security Toolbox for Detecting Novel and Sophisticated Android Malware., , , , and . ICSE (2), page 733-736. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).A "Human-in-the-loop" approach for resolving complex software anomalies., , , , and . SMC, page 1971-1978. IEEE, (2014)