Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fortifying Applications Against Xpath Injection Attacks., , and . MCIS, page 95. Athens University of Economics and Business / AISeL, (2009)Syntax-Aware Mutation for Testing the Solidity Compiler., , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 327-347. Springer, (2023)A Replication Package for PyCG: Practical Call Graph Generation in Python., , , , and . ICSE (Companion Volume), page 200. IEEE, (2021)The bug catalog of the maven ecosystem., , , , and . MSR, page 372-375. ACM, (2014)Cyberdiversity: Measures and Initial Results., , and . Panhellenic Conference on Informatics, page 135-140. IEEE Computer Society, (2010)Securing Legacy Code with the TRACER Platform., , , , , , , and . Panhellenic Conference on Informatics, page 26:1-26:6. ACM, (2014)Pythia: Identifying Dangerous Data-flows in Django-based Applications., , , and . EuroSec@EuroSys, page 5:1-5:6. ACM, (2019)Detecting Missing Dependencies and Notifiers in Puppet Programs., , and . CoRR, (2019)TRACER: A Platform for Securing Legacy Code., , , , , , , and . TRUST, volume 8564 of Lecture Notes in Computer Science, page 218-219. Springer, (2014)CrossVul: a cross-language vulnerability dataset with commit data., , , and . ESEC/SIGSOFT FSE, page 1565-1569. ACM, (2021)