Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical privilege profiling., and . NSPW, page 111-118. ACM, (2005)Themes and Highlights of the New Security Paradigms Workshop 2003., and . ACSAC, page 330-331. IEEE Computer Society, (2003)An evolutionary approach to cyber security.. NSPW, page 108-109. ACM, (2002)Characterizing the behavior of a program using multiple-length N-grams.. NSPW, page 101-110. ACM, (2000)Literate Programming on a Team Project., and . Softw. Pract. Exp., 21 (7): 677-683 (1991)Formal Verification of Ada Programs., , and . Larch, page 104-141. Springer, (1992)Remote Attribute Updating for Language-Based Editors., , and . POPL, page 1-13. ACM Press, (1986)Formal methods in the THETA kernel., , , and . S&P, page 88-100. IEEE Computer Society, (1995)Themes and Highlights of the New Security Paradigms Workshop 2004., and . ACSAC, page 382-383. IEEE Computer Society, (2004)Modular Behavior Profiles in Systems with Shared Libraries (Short Paper)., and . ICICS, volume 4307 of Lecture Notes in Computer Science, page 369-378. Springer, (2006)