Author of the publication

Model Checking An Entire Linux Distribution for Security Violations.

, , , , , , and . ACSAC, page 13-22. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predictive Multi-Microgrid Generation Maintenance: Formulation and Impact on Operations & Resilience., , , and . CoRR, (2020)Event-driven Security-Constrained Unit Commitment., , and . ISGT, page 1-5. IEEE, (2016)Integrating the first HVDC-based offshore wind power into PJM system - A real project case study.. IAS, page 1-8. IEEE, (2015)Pediatric rehabilitation with the reachMAN's modular handle., , , , , , and . EMBC, page 3933-3936. IEEE, (2015)Simulation and modeling of dielectric barrier impact on heterogeneous electric field., , , , , and . EIT, page 71-76. IEEE, (2017)Model Checking An Entire Linux Distribution for Security Violations., , , , , , and . ACSAC, page 13-22. IEEE Computer Society, (2005)Simplifying the development of network management systems in a distributed environment., , , , , and . NOMS, page 549-558. IEEE, (1998)Design Recovery for Software Testing of Object-Oriented Programs., , , , and . WCRE, page 202-211. IEEE Computer Society, (1993)The role of demand response as an alternative transmission expansion solution in a capacity market., , and . IAS, page 1-7. IEEE, (2017)Design of a compliant, stabilizing wrist mechanism for a pediatric hand exoskeleton., , , , , , , , and . ICORR, page 1-6. IEEE, (2022)