From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques., , , , , и . SP, стр. 614-631. IEEE, (2022)µSE: Mutation-Based Evaluation of Security-Focused Static Analysis Tools for Android., , , , и . ICSE (Companion Volume), стр. 53-56. IEEE, (2021)μSE: Mutation-based Evaluation of Security-focused Static Analysis Tools for Android., , , , и . CoRR, (2021)Systematic Mutation-based Evaluation of the Soundness of Security-focused Android Static Analysis Techniques., , , , и . CoRR, (2021)Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques., , , , , и . CoRR, (2021)Modeling Software Defects as Anomalies: A Case Study on Promise Repository., , , и . J. Softw., 12 (10): 759-772 (2017)Effects of Internship on Fresh Graduates: A case study on IIT, DU students., , , и . CoRR, (2020)A Static Code Search Technique to Identify Dead Fields by Analyzing Usage of Setup Fields and Field Dependency in Test Code., , и . CDUD@CLA, том 1625 из CEUR Workshop Proceedings, стр. 60-71. CEUR-WS.org, (2016)"False negative - that one is going to kill you": Understanding Industry Perspectives of Static Analysis based Security Testing., , , и . CoRR, (2023)Mobicomonkey: context testing of Android apps., , , и . MOBILESoft@ICSE, стр. 76-79. ACM, (2018)