Author of the publication

EvoIsolator: Evolving Program Slices for Hardware Isolation Based Security.

, , , and . SSBSE, volume 11036 of Lecture Notes in Computer Science, page 377-382. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special issue on systems and software product line engineering., and . J. Syst. Softw., (2019)The maturation of search-based software testing: successes and challenges.. SBST@ICSE, page 13-14. IEEE / ACM, (2019)Cluttered Orderings for the Complete Graph., , and . COCOON, volume 2108 of Lecture Notes in Computer Science, page 420-431. Springer, (2001)Challenges in Composing and Decomposing Assurances for Self-Adaptive Systems., , , , , , , , and . Software Engineering for Self-Adaptive Systems, volume 9640 of Lecture Notes in Computer Science, page 64-89. Springer, (2013)Introduction to the special issue on search based software engineering., and . Empirical Software Engineering, 18 (3): 547-549 (2013)Users beware: preference inconsistencies ahead., , and . ESEC/SIGSOFT FSE, page 295-306. ACM, (2015)Configurations everywhere: implications for testing and debugging in practice., , , and . ICSE Companion, page 215-224. ACM, (2014)Optimal and pessimal orderings of Steiner triple systems in disk arrays., and . Theor. Comput. Sci., 297 (1-3): 103-117 (2003)A hybrid approach to testing for nonfunctional faults in embedded systems using genetic algorithms., , , and . Softw. Test. Verification Reliab., (2018)HIFuzz: Human Interaction Fuzzing for small Unmanned Aerial Vehicles., , , , , , , and . CoRR, (2023)