From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Hybrid Approach for Safe Memory Management in C., , , и . AMAST, том 5140 из Lecture Notes in Computer Science, стр. 377-391. Springer, (2008)Scalable Security Verification of Software at Compile Time., , , , и . SCAM, стр. 115-124. IEEE Computer Society, (2014)Smart Metering Privacy-preserving Techniques in a Nutshell., , , , и . ANT/SEIT, том 32 из Procedia Computer Science, стр. 1087-1094. Elsevier, (2014)Type and Effect Annotations for Safe Memory Access in C., и . ARES, стр. 302-309. IEEE Computer Society, (2008)Verification of CERT Secure Coding Rules: Case Studies., , , и . OTM Conferences (2), том 5871 из Lecture Notes in Computer Science, стр. 913-930. Springer, (2009)Model-Checking for Software Vulnerabilities Detection with Multi-Language Support., , , и . PST, стр. 133-142. IEEE Computer Society, (2008)A novel flow-sensitive type and effect analysis for securing C code., и . AICCSA, стр. 661-668. IEEE Computer Society, (2008)