Search for persons
X
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
1
Original Entry Point Detection Based on Graph Similarity:
, In:
?
Computer Science – Theory and Applications; Lecture Notes in Computer Science ,
2
On the Determinization of Event-Clock Input-Driven Pushdown..:
, In:
?
The 11th International Symposium on Information and Communication Technology ,
3
Automatic Stub Generation for Dynamic Symbolic Execution of..:
, In:
?
Communications in Computer and Information Science; Formal Techniques for Safety-Critical Systems ,
4
Formal Semantics Extraction from MIPS Instruction Manual:
, In:
?
Descriptional Complexity of Formal Systems; Lecture Notes in Computer Science ,
5
On Classes of Regular Languages Related to Monotone WQOs:
, In:
?
Lecture Notes in Computer Science; Formal Methods – The Next 30 Years ,
6
Formal Semantics Extraction from Natural Language Specifica..:
, In:
?
2019 International Conference on Advanced Information Technologies (ICAIT) ,
7
Applying Clustering Techniques for Refining Large Data Set:..:
, In:
?
Proceedings of the 7th Software Security, Protection, and Reverse Engineering / Software Security and Protection Workshop ,
8
Packer identification based on metadata signature:
, In:
?
10
Automated Technology for Verification and Analysis
11th International Symposium, ATVA 2013, Hanoi, Vietnam, Oc...
Lecture Notes in Computer Science ; 8172;SpringerLink, Bücher
?
The 2013 RIVF International Conference on Computing & Communication Technologies - Research, Innovation, and Vision for Future (RIVF) ,
11
Preface:
, In:
?
Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation ,
15