Roover, Coen De
140  Ergebnisse:
Personensuche X
?
 
?
2

Control and Data Flow in Security Smell Detection for Infra..:

, In: 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR),
 
?
3

The Docker Hub Image Inheritance Network: Construction and ..:

, In: 2023 IEEE 23rd International Working Conference on Source Code Analysis and Manipulation (SCAM),
Opdebeeck, Ruben ; Lesy, Jonas ; Zerouali, Ahmed. - p. 198-208 , 2023
 
?
4

Helm Charts for Kubernetes Applications: Evolution, Outdate..:

, In: 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR),
 
?
7

Formalizing, Verifying and Applying ISA Security Guarantees..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
 
?
8

Cross-Level Debugging for Static Analysers:

, In: Proceedings of the 16th ACM SIGPLAN International Conference on Software Language Engineering,
 
?
9

Result Invalidation for Incremental Modular Analyses:

, In: Lecture Notes in Computer Science; Verification, Model Checking, and Abstract Interpretation,
 
?
11

Symbolic Execution to Detect Semantic Merge Conflicts:

, In: 2023 IEEE 23rd International Working Conference on Source Code Analysis and Manipulation (SCAM),
 
?
12

Dynamic Slicing of WebAssembly Binaries:

, In: 2023 IEEE International Conference on Software Maintenance and Evolution (ICSME),
 
?
14

Change Pattern Detection for Optimising Incremental Static ..:

, In: 2023 IEEE 23rd International Working Conference on Source Code Analysis and Manipulation (SCAM),
 
1-15