Author of the publication

Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.

, , , and . SECRYPT, page 100-111. SciTePress, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Economic Evaluation of Interactive Audio Media for Securing Internet Services., , and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 46-53. Springer, (2011)The ACID model checker and code generator for transaction processing., and . HPCS, page 138-144. IEEE, (2009)Probabilistic Model Checking of CAPTCHA Admission Control for DoS Resistant Anti-SPIT Protection., , , , and . CRITIS, volume 7722 of Lecture Notes in Computer Science, page 143-154. Springer, (2012)On Neural Network Equivalence Checking Using SMT Solvers., , , and . FORMATS, volume 13465 of Lecture Notes in Computer Science, page 237-257. Springer, (2022)Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions., , , and . SECRYPT, page 28-40. SciTePress, (2016)Product Line Variability with Elastic Components and Test-Driven Development., , and . CIMCA/IAWTIC/ISE, page 146-151. IEEE Computer Society, (2008)Securing Legacy Code with the TRACER Platform., , , , , , , and . Panhellenic Conference on Informatics, page 26:1-26:6. ACM, (2014)Semantic Modeling and Analysis of Natural Language System Requirements., , , and . IEEE Access, (2022)Runtime Verification for FMI-Based Co-simulation., , and . RV, volume 13498 of Lecture Notes in Computer Science, page 304-313. Springer, (2022)Formal Verification of Network Interlocking Control by Distributed Signal Boxes., and . IMBSA, volume 11842 of Lecture Notes in Computer Science, page 204-221. Springer, (2019)