Personensuche
X
?
2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR) ,
2
Control and Data Flow in Security Smell Detection for Infra..:
, In:
?
2023 IEEE 23rd International Working Conference on Source Code Analysis and Manipulation (SCAM) ,
3
The Docker Hub Image Inheritance Network: Construction and ..:
, In:
?
2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR) ,
4
Helm Charts for Kubernetes Applications: Evolution, Outdate..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
7
Formalizing, Verifying and Applying ISA Security Guarantees..:
, In:
?
Proceedings of the 16th ACM SIGPLAN International Conference on Software Language Engineering ,
8
Cross-Level Debugging for Static Analysers:
, In:
?
Lecture Notes in Computer Science; Verification, Model Checking, and Abstract Interpretation ,
9
Result Invalidation for Incremental Modular Analyses:
, In:
?
2023 IEEE 23rd International Working Conference on Source Code Analysis and Manipulation (SCAM) ,
11
Symbolic Execution to Detect Semantic Merge Conflicts:
, In:
?
2023 IEEE International Conference on Software Maintenance and Evolution (ICSME) ,
12
Dynamic Slicing of WebAssembly Binaries:
, In:
?
2023 IEEE 23rd International Working Conference on Source Code Analysis and Manipulation (SCAM) ,
14