Legay, Axel
1489  Ergebnisse:
Personensuche X
?
1

Daedalux: An Extensible Platform for Variability-Aware Mode..:

, In: 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion),
 
?
2

Secure federated learning applied to medical imaging with f..:

, In: 2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC),
 
?
3

Avoiding "Hot Potato" Problems in Internet Service Provider:

, In: NOMS 2024-2024 IEEE Network Operations and Management Symposium,
 
?
4

On Exploiting Symbolic Execution to Improve the Analysis of..:

, In: Foundations and Practice of Security; Lecture Notes in Computer Science,
 
?
5

Combinatorial Transition Testing in Dynamically Adaptive Sy..:

, In: Proceedings of the 18th International Working Conference on Variability Modelling of Software-Intensive Systems,
Martou, Pierre ; Duhoux, Benoît ; Mens, Kim. - p. 1-10 , 2024
 
?
6

With or Without U(sers): A Journey to Integrate UX Activiti..:

, In: HCI for Cybersecurity, Privacy and Trust; Lecture Notes in Computer Science,
Azevedo, Daniela ; Ramelot, Justine ; Legay, Axel. - p. 212-231 , 2024
 
?
7

Daedalux: An Extensible Platform for Variability-Aware Mode..:

, In: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings,
 
?
9

Synthesis and Verification of Mission Plans for Multiple Au..:

Gu, Rong ; Baranov, Eduard ; Ameri, Afshin...
ACM Transactions on Software Engineering and Methodology.  , 2024
 
?
11

Experimental Toolkit for Manipulating Executable Packing:

, In: Lecture Notes in Computer Science; Risks and Security of Internet and Systems,
 
?
12

Network Simulator-Centric Compositional Testing:

, In: Formal Techniques for Distributed Objects, Components, and Systems; Lecture Notes in Computer Science,
Rousseaux, Tom ; Crochet, Christophe ; Aoga, John. - p. 177-196 , 2024
 
?
13

Bridging Disciplinary Boundaries: Integrating XR in Communi..:

, In: Lecture Notes in Computer Science; Learning and Collaboration Technologies,
 
?
14

Refinement of Systems with an Attacker Focus:

, In: Formal Methods for Industrial Critical Systems; Lecture Notes in Computer Science,
 
?
15

Product Incremental Security Risk Assessment Using DevSecOp..:

, In: Computer Security. ESORICS 2022 International Workshops; Lecture Notes in Computer Science,
 
1-15