From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes., , , , и . SAFECOMP Workshops, том 12853 из Lecture Notes in Computer Science, стр. 105-116. Springer, (2021)A Guided Search for Races Based on Data Flow Patterns., , , , и . SAFECOMP Workshops, том 13415 из Lecture Notes in Computer Science, стр. 47-58. Springer, (2022)Constraint-Based Testing for Buffer Overflows., , , и . SAFECOMP Workshops, том 11094 из Lecture Notes in Computer Science, стр. 99-111. Springer, (2018)Comparative Evaluation of Security Fuzzing Approaches., , , и . SAFECOMP Workshops, том 11699 из Lecture Notes in Computer Science, стр. 49-61. Springer, (2019)Tikuna: An Ethereum Blockchain Network Security Monitoring System., , и . ISPEC, том 14341 из Lecture Notes in Computer Science, стр. 462-476. Springer, (2023)Analysis of Potential Code Vulnerabilities Involving Overlapping Instructions., , , и . SAFECOMP Workshops, том 10489 из Lecture Notes in Computer Science, стр. 103-113. Springer, (2017)