Search for persons
X
?
Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering ,
2
Detecting Security Fixes in Open-Source Repositories using ..:
, In:
?
Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering ,
3
Negative Complement of a Set of Vulnerability-Fixing Commit..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
4
An Approach to Generate Realistic HTTP Parameters for Appli..:
, In:
?
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies ,
6
Declarative Access Control for Aggregations of Multiple Own..:
, In:
?
Lecture Notes in Computer Science; Emerging Technologies for Authorization and Authentication ,
7