From post

Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities.

, , , и . InterSol, том 449 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 105-115. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Koala, Gouayon
add a person with the name Koala, Gouayon
 

Другие публикации лиц с тем же именем

Vulnerability Analysis in Mobile Banking and Payment Applications on Android in African Countries., , , и . InterSol, том 321 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 164-175. Springer, (2020)Detection of Vulnerabilities Related to Permissions Requests for Android Apps Using Machine Learning Techniques., , , , и . SoCPaR, том 1383 из Advances in Intelligent Systems and Computing, стр. 810-822. Springer, (2020)Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities., , , и . InterSol, том 449 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 105-115. Springer, (2022)Software Vulnerabilities Detection Using a Trace-Based Analysis Model., , , и . AFRICOMM, том 499 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 446-457. Springer, (2022)Analysis of the Impact of Permissions on the Vulnerability of Mobile Applications., , , , и . AFRICOMM, том 311 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 3-14. Springer, (2019)