Author of the publication

Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen.

, , , , , , , , and . Sicherheit, volume P-228 of LNI, page 283-291. GI, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reduzierung der Programmgröße mit Hilfe von Klonerkennung., and . GI Jahrestagung (2), volume P-134 of LNI, page 631-636. GI, (2008)Adapting mutation and recombination operators to range-aware relations in real-world application data., , and . GECCO Companion, page 755-758. ACM, (2022)Automatic Security-Flaw Detection Replication and Comparison., and . MODELS, page 84-94. IEEE, (2023)Machine Learning for SAST: A Lightweight and Adaptable Approach., , , , and . ESORICS (4), volume 14347 of Lecture Notes in Computer Science, page 85-104. Springer, (2023)Using density of training data to improve evolutionary algorithms with approximative fitness functions., , and . CEC, page 1-10. IEEE, (2022)Zertifizierte Datensicherheit für Android-Anwendungen auf Basis statischer Programmanalysen., , , , , , , , and . Sicherheit, volume P-228 of LNI, page 283-291. GI, (2014)Software Security Comprehension., and . Softwaretechnik-Trends, (2011)Improving Evolutionary Algorithms by Enhancing an Approximative Fitness Function through Prediction Intervals., , and . CEC, page 127-135. IEEE, (2021)Engineering eNYPD - Entry Points Detector Jakarta Server Faces Use Case., , and . SCAM, page 30-35. IEEE, (2021)Repetitive Processes and Their Surrogate-Model Congruent Encoding for Evolutionary Algorithms - A Theoretic Proposal., , and . GECCO Companion, page 2289-2296. ACM, (2023)