Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FAITH: Scanning of Rich Web Applications for Parameter Tampering Vulnerabilities, , and . CoRR, (2012)An Empirical Study of Software Metrics., and . IEEE Trans. Software Eng., 13 (6): 697-708 (1987)HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript., and . NSS, page 269-274. IEEE Computer Society, (2010)Scanning of real-world web applications for parameter tampering vulnerabilities., , , and . AsiaCCS, page 341-352. ACM, (2014)Evaluation of automated airway morphological quantification for assessing fibrosing lung disease., , , , , , , , , and 14 other author(s). Comput. methods Biomech. Biomed. Eng. Imaging Vis., (December 2024)SSLock: sustaining the trust on entities brought by SSL., and . AsiaCCS, page 204-213. ACM, (2010)A multichannel extension of the fiber distributed data interface (FDDI) using tunable-channel access.. LCN, page 139-141. IEEE Computer Society, (1992)Search for Lambda/c+ --> p K+ pi- and D/s+ --> K+ K+ pi- using genetic programming event selection, , , , , , , , , and 98 other author(s). Physics Letters B, B624 (3-4): 166--172 (29 September 2005)Application of Genetic Programming to High Energy Physics Event Selection, , , , , , , , , and 98 other author(s). Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, A551 (2-3): 504--527 (11 October 2005)The FOCUS Collaboration.