Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation., , and . AsiaCCS, page 247-258. ACM, (2023)Enhancing NFV Orchestration with Security Policies., and . ARES, page 45:1-45:6. ACM, (2018)Combining Risk Analysis and Security Testing., , , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 322-336. Springer, (2014)Defining Software Test Architectures with the UML Testing Profile., and . ICSTW, page 271-280. IEEE, (2023)Execution of UTP test cases using fUML., and . MoDELS (Workshops), volume 2245 of CEUR Workshop Proceedings, page 245-250. CEUR-WS.org, (2018)Towards Executable UML Interactions based on fUML.. MODELSWARD, page 405-411. SciTePress, (2016)Extending the UML Testing Profile with a Fine-Grained Test Logging Model., , , and . ICST Workshops, page 257-266. IEEE Computer Society, (2018)Abstractions on Test Design Techniques.. FedCSIS, volume 2 of Annals of Computer Science and Information Systems, page 1575-1584. (2014)MIDAS: Automated SOA Testing on the Cloud., , , and . ERCIM News, (2013)A Negative Input Space Complexity Metric as Selection Criterion for Fuzz Testing., , and . ICTSS, volume 9447 of Lecture Notes in Computer Science, page 257-262. Springer, (2015)