Search for persons
X
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
1
Analysis of Cryptographic CVEs: Lessons Learned and Perspec..:
, In:
?
2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC) ,
3
Comparing the Effectiveness of Static, Dynamic and Hybrid M..:
, In:
?
2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC) ,
5
How Secure is Code Generated by ChatGPT?:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
6
A Modular Runtime Enforcement Model Using Multi-traces:
, In:
?
Proceedings of the 19th International Conference on Mining Software Repositories ,
8
TwinDroid : a dataset of Android app system call traces ..:
, In:
?
2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR) ,
9
TwinDroid: A Dataset of Android app System call traces and ..:
, In:
?
2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS) ,
10
A Taxonomy of Software Flaws Leading to Buffer Overflows:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
11
Employing Feature Selection to Improve the Performance of I..:
, In:
?
2021 28th Asia-Pacific Software Engineering Conference (APSEC) ,
14