Search for persons
X
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
1
Analysis of Cryptographic CVEs: Lessons Learned and Perspec..:
, In:
?
2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC) ,
2
Comparing the Effectiveness of Static, Dynamic and Hybrid M..:
, In:
?
2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC) ,
3
How Secure is Code Generated by ChatGPT?:
, In:
?
2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR) ,
4
TwinDroid: A Dataset of Android app System call traces and ..:
, In:
?
2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS) ,
5
A Taxonomy of Software Flaws Leading to Buffer Overflows:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
6
Employing Feature Selection to Improve the Performance of I..:
, In:
?
Proceedings of the 19th International Conference on Mining Software Repositories ,
7
TwinDroid : a dataset of Android app system call traces ..:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
8
A Modular Runtime Enforcement Model Using Multi-traces:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
9
An Analysis of the Use of CVEs by IoT Malware:
, In:
?
2021 28th Asia-Pacific Software Engineering Conference (APSEC) ,
10
Behavioral classification of Android applications using sys..:
, In:
?
Studies in Big Data; Decentralised Internet of Things ,
11
Smart Contracts-Enabled Simulation for Hyperconnected Logis..:
, In:
?
2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) ,
12
On the Use of API Calls for Detecting Repackaged Malware Ap..:
, In:
?
2019 IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC) ,
13
Predictive Analytics for Event Stream Processing:
, In:
?
2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW) ,
14
TRIADE A Three-Factor Trace Segmentation Method to Support ..:
, In:
?
Runtime Verification; Lecture Notes in Computer Science ,
15