Author of the publication

An Approach for Safe and Secure Software Protection Supported by Symbolic Execution

, , , , , and . Database and Expert Systems Applications - DEXA 2023 Workshops, page 67--78. Cham, Springer Nature Switzerland, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Evaluation for Object Initialization of Member Variables in Unit Testing., , , and . VST@SANER, page 8-11. IEEE, (2020)On Extracting Feature Models from Sets of Valid Feature Combinations., , and . FASE, volume 7793 of Lecture Notes in Computer Science, page 53-67. Springer, (2013)Improving CASA Runtime Performance by Exploiting Basic Feature Model Analysis., , and . CoRR, (2013)A parallel evolutionary algorithm for prioritized pairwise testing of software product lines., , , , , and . GECCO, page 1255-1262. ACM, (2014)Using feature model knowledge to speed up the generation of covering arrays., , and . VaMoS, page 16:1-16:6. ACM, (2013)Towards a Benchmark and a Comparison Framework for Combinatorial Interaction Testing of Software Product Lines., , , , , and . CoRR, (2014)Reverse Engineering Feature Models from Programs' Feature Sets., , and . WCRE, page 308-312. IEEE Computer Society, (2011)An Approach for Safe and Secure Software Protection Supported by Symbolic Execution., , , , , and . DEXA Workshops, volume 1872 of Communications in Computer and Information Science, page 67-78. Springer, (2023)