Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Solutions to IBM POWER8 verification challenges., , , , , , , , , and 12 other author(s). IBM J. Res. Dev., (2015)Benefits of Bounded Model Checking at an Industrial Setting., , , , , , and . CAV, volume 2102 of Lecture Notes in Computer Science, page 436-453. Springer, (2001)Accurate Malware Detection by Extreme Abstraction., , , , , and . ACSAC, page 101-111. ACM, (2018)Deep ahead-of-threat virtual patching., , , and . CoRR, (2020)Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device., , , and . CoRR, (2018)Test sequence generation and model checking using dynamic transition relations., , , and . Int. J. Softw. Tools Technol. Transf., 6 (2): 174-182 (2004)SMESEC: A Cybersecurity Framework to Protect, Enhance and Educate SMEs., , and . ERCIM News, (2018)Integration of an online voting solution with the SMESEC security framework., , , , , , , , , and 1 other author(s). SysCon, page 1-8. IEEE, (2020)Efficient Debugging in a Formal Verification Environment., , , , and . CHARME, volume 2144 of Lecture Notes in Computer Science, page 275-292. Springer, (2001)Efficient debugging in a formal verification environment., , , , and . Int. J. Softw. Tools Technol. Transf., 4 (3): 335-348 (2003)