Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blueprints for a Large-Scale Early Warning System., , , , , , , and . Panhellenic Conference on Informatics, page 7-11. IEEE Computer Society, (2010)Introducing Pergamos: A Fedora-Based DL System Utilizing Digital Object Prototypes., , , and . ECDL, volume 4172 of Lecture Notes in Computer Science, page 500-503. Springer, (2006)Self-Configuring and Optimizing Mobile Ad Hoc Networks., , , , and . ICAC, page 372-373. IEEE Computer Society, (2005)Dismal Code: Studying the Evolution of Security Bugs., , , , and . LASER, page 37-48. USENIX Association, (2013)Countering Code Injection Attacks: A Unified Approach., , , and . Inf. Manag. Comput. Secur., 19 (3): 177-194 (2011)The Vulnerability Dataset of a Large Software Ecosystem., , , , , and . BADGERS@ESORICS, page 69-74. IEEE, (2014)Generating the Blueprints of the Java Ecosystem., , , , and . MSR, page 510-513. IEEE Computer Society, (2015)Fortifying Applications Against Xpath Injection Attacks., , and . MCIS, page 95. Athens University of Economics and Business / AISeL, (2009)A type-safe embedding of SQL into Java using the extensible compiler framework J%., , , and . Comput. Lang. Syst. Struct., (2015)On domain-specific languages usage (why DLSs really matter).. ACM Crossroads, 20 (3): 16-17 (2014)