From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring., , и . ECOOP, том 4609 из Lecture Notes in Computer Science, стр. 525-549. Springer, (2007)Evaluating Security Through Isolation and Defense in Depth., , , и . IEEE Secur. Priv., 22 (1): 69-72 (января 2024)"Free" as in Freedom to Protest?, , , , , , , , и . IEEE Secur. Priv., 20 (5): 16-21 (2022)An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities., , , и . ACM Trans. Softw. Eng. Methodol., 32 (1): 25:1-25:45 (января 2023)A systematic literature review of model-driven security engineering for cyber-physical systems., и . J. Syst. Softw., (2020)The Clara framework for hybrid typestate analysis., и . Int. J. Softw. Tools Technol. Transf., 14 (3): 307-326 (2012)Debugging Static Analysis., , , , и . IEEE Trans. Software Eng., 46 (7): 697-709 (2020)IDE Support for Cloud-Based Static Analyses., и . Software Engineering, том P-320 из LNI, стр. 61-63. Gesellschaft für Informatik e.V., (2022)A lightweight LTL runtime verification tool for java.. OOPSLA Companion, стр. 306-307. ACM, (2004)Gamifying static analysis., и . ESEC/SIGSOFT FSE, стр. 714-718. ACM, (2018)