Personensuche
X
?
2024 IEEE 40th International Conference on Data Engineering (ICDE) ,
1
Kondo: Efficient Provenance-Driven Data Debloating:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
2
SoK: A Tale of Reduction, Security, and Correctness - Evalu..:
, In:
?
IFIP Advances in Information and Communication Technology; Critical Infrastructure Protection XVII ,
4
Analyzing Discrepancies in Whole-Network Provenance:
, In:
?
2023 IEEE Secure Development Conference (SecDev) ,
5
BLADE: Towards Scalable Source Code Debloating:
, In:
?
Proceedings of the 16th Cyber Security Experimentation and Test Workshop ,
10
Towards Reproducible Ransomware Analysis:
, In:
?
2022 IEEE 29th International Conference on High Performance Computing, Data, and Analytics (HiPC) ,
14
Provenance-based Workflow Diagnostics Using Program Specifi..:
, In:
?
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering ,
15