Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An empirical evaluation of six methods to detect faults in software., , , and . Softw. Test. Verification Reliab., 12 (3): 155-171 (2002)Towards Network Science Enhanced Cyber Situational Awareness., , and . Int. J. Cyber Situational Aware., 2 (1): 11-30 (2017)Views on Software Testability (Panel Abstract)., , , and . ISSTA, page 240. ACM, (1994)The Use of Self Checks and Voting in Software Error Detection: An Empirical Study., , , and . IEEE Trans. Software Eng., 16 (4): 432-443 (1990)An Empirical Comparison of Software Fault Tolerance and Fault Elimination., and . IEEE Trans. Software Eng., 17 (2): 173-182 (1991)Safety Verification in Murphy Using Fault Tree Analysis., , and . ICSE, page 377-387. IEEE Computer Society, (1988)Software Security in an Internet World: An Executive Summary., and . IEEE Softw., 16 (4): 58-61 (1999)Using uncleanliness to predict future botnet addresses., , , , , , and . Internet Measurement Conference, page 93-104. ACM, (2007)Roundtable on Information Security Policy., , , , , , , , , and . IEEE Softw., 17 (5): 26-32 (2000)Safety Verification of Ada Programs Using Software Fault Trees., , and . IEEE Softw., 8 (4): 48-59 (1991)