Author of the publication

An Approach for Safe and Secure Software Protection Supported by Symbolic Execution

, , , , , and . Database and Expert Systems Applications - DEXA 2023 Workshops, page 67--78. Cham, Springer Nature Switzerland, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Polylog-Time Hierarchy Captured by Restricted Second-Order Logic., , , and . SYNASC, page 133-140. IEEE, (2018)A Logic for Reflective ASMs., and . ABZ, volume 12071 of Lecture Notes in Computer Science, page 93-106. Springer, (2020)A unifying logic for non-deterministic, parallel and concurrent abstract state machines., , , and . Ann. Math. Artif. Intell., 83 (3-4): 321-349 (2018)Descriptive Complexity of Deterministic Polylogarithmic Time., , , , and . WoLLIC, volume 11541 of Lecture Notes in Computer Science, page 208-222. Springer, (2019)A Restricted Second-Order Logic for Non-deterministic Poly-Logarithmic Time., , , and . CoRR, (2019)Fuzzing-based grammar learning from a minimal set of seed inputs., , and . J. Comput. Lang., (March 2024)Behavioural Theory of Reflective Algorithms., and . ABZ, volume 14010 of Lecture Notes in Computer Science, page 238-244. Springer, (2023)An Architecture for Automated Security Test Case Generation for MQTT Systems., , and . DEXA Workshops, volume 1285 of Communications in Computer and Information Science, page 48-62. Springer, (2020)An Approach for Safe and Secure Software Protection Supported by Symbolic Execution., , , , , and . DEXA Workshops, volume 1872 of Communications in Computer and Information Science, page 67-78. Springer, (2023)Evolving concurrent systems: behavioural theory and logic., , , , and . ACSW, page 77:1-77:10. ACM, (2017)