Author of the publication

Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.

, , , , and . DIMVA, volume 4064 of Lecture Notes in Computer Science, page 1-16. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Efficiency Analysis of RLS-MUSIC based Smart Antenna System for 5G Network., , and . CISS, page 1-5. IEEE, (2021)An authentication model for delegation, attribution and least privilege., , and . PETRA, ACM, (2010)Improving End-to-End Verifiable Voting Systems with Blockchain Technologies., and . iThings/GreenCom/CPSCom/SmartData, page 1108-1115. IEEE, (2018)Human-centered strategies for cyber-physical systems security., , and . EAI Endorsed Trans. Security Safety, 4 (14): e5 (2018)Energy Efficient Smart Antenna Beamforming Algorithms for Next-Generation Networks., , and . CCWC, page 1106-1113. IEEE, (2021)Transfer Learning Model for Disrupting Misinformation During a COVID-19 Pandemic., , , and . CCWC, page 245-250. IEEE, (2021)Measuring Personal Privacy Breaches Using Third-Party Trackers., , , , and . TrustCom/BigDataSE, page 1615-1618. IEEE, (2018)Decoding Linguistic Ambiguity in Times of Emergency based on Twitter Disaster Datasets., , , and . CCWC, page 1239-1244. IEEE, (2021)Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs., , , , and . DIMVA, volume 4064 of Lecture Notes in Computer Science, page 1-16. Springer, (2006)Energy Efficient Cellular Network User Clustering Using Linear Radius Algorithm., , and . CISS, page 1-5. IEEE, (2019)