Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert computation: hiding code in code for obfuscation purposes., , , , , , and . AsiaCCS, page 529-534. ACM, (2013)A comparison of Web service technologies for smart meter data exchange., , , and . ISGT Europe, page 1-8. IEEE, (2012)Covert Computation - Hiding code in code through compile-time obfuscation., , , , , , and . Comput. Secur., (2014)A Fault-Driven Combinatorial Process for Model Evolution in XSS Vulnerability Detection., , , , and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 207-215. Springer, (2019)Automated combinatorial testing for detecting SQL vulnerabilities in web applications., , and . AST@ICSE, page 55-61. IEEE / ACM, (2019)CAMETRICS: A Tool for Advanced Combinatorial Analysis and Measurement of Test Sets., , and . ICST Workshops, page 318-327. IEEE Computer Society, (2018)Practical Combinatorial Testing for XSS Detection using Locally Optimized Attack Models., , , and . ICST Workshops, page 122-130. IEEE, (2019)DOMdiff: Identification and Classification of Inter-DOM Modifications., and . WI, page 262-269. IEEE Computer Society, (2018)A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences., , , , , and . Comput. Secur., (2022)XIEv: dynamic analysis for crawling and modeling of web applications., and . SAC, page 2201-2210. ACM, (2020)