Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Monitoring of the Microgrid Using IEC 62351-7 Network and System Management., , , , , and . ISGT, page 1-5. IEEE, (2022)Team Edit Automata for Testing Security Property., , and . IAS, page 235-240. IEEE Computer Society, (2007)On the prevalence of software supply chain attacks: Empirical study and investigative framework., , , and . Forensic Sci. Int. Digit. Investig., 44 (Supplement): 301508 (March 2023)A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities., , , and . OTM Conferences (2), volume 5871 of Lecture Notes in Computer Science, page 815-832. Springer, (2009)Targeting Security Vulnerabilities: From Specification to Detection (Short Paper)., , , , and . QSIC, page 97-102. IEEE Computer Society, (2008)Security Evaluation and Hardening of Free and Open Source Software (FOSS)., , , , , , , , , and 4 other author(s). ECEASST, (2010)Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting, , , , , , , , , and . Advances in Information Security Springer, (2020)An Analysis of Security Vulnerabilities in Container Images for Scientific Data Analysis., , , and . CoRR, (2020)On Leveraging Coding Habits for Effective Binary Authorship Attribution., , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 26-47. Springer, (2018)BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables., , , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 341-355. Springer, (2017)