Author of the publication

Securing energy metering software with automatic source code correction.

, , and . INDIN, page 701-706. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of vulnerabilities and automatic protection for web applications. University of Lisbon, Portugal, (2016)Towards a Deep Learning Model for Vulnerability Detection on Web Application Variants., , , and . ICST Workshops, page 465-476. IEEE, (2020)Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy., and . ACM Trans. Priv. Secur., 25 (3): 19:1-19:39 (2022)ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities., , , , and . J. Inf. Secur. Appl., (2021)Enriching Threat Intelligence Platforms Capabilities., , , , and . ICETE (2), page 37-48. SciTePress, (2019)Low-Cost Serverless SIEM in the Cloud., , and . SRDS, page 381-382. IEEE, (2019)On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study., , , , , and . EDCC, page 121-128. IEEE Computer Society, (2017)FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network Flows., , , and . TrustCom/BigDataSE, page 567-572. IEEE, (2018)Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report., , and . DSN, page 630-637. IEEE Computer Society, (2016)Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining., , and . IEEE Trans. Reliability, 65 (1): 54-69 (2016)