Author of the publication

Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities.

, , , and . APSEC (1), page 363-370. IEEE Computer Society, (2013)978-1-4799-2143-0.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Infeasible Paths: Approaches and Challenges., and . ENASE (Selected Papers), volume 410 of Communications in Computer and Information Science, page 64-78. Springer, (2012)Improved Partitioning Graph Embedding Framework for Small Cluster., , , , and . KSEM, volume 12815 of Lecture Notes in Computer Science, page 203-215. Springer, (2021)Detecting infeasible branches based on code patterns., , and . CSMR-WCRE, page 74-83. IEEE Computer Society, (2014)ABOR: An Automatic Framework for Buffer Overflow Removal in C/C++Programs., , and . ICEIS (Revised Selected Papers), volume 227 of Lecture Notes in Business Information Processing, page 204-221. Springer, (2014)Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation., , , , and . COMPSAC Workshops, page 559-564. IEEE Computer Society, (2012)Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs., , and . ICEIS (2), page 49-59. SciTePress, (2014)Design verification for database applications through analysing their support to data lifecycle., and . Int. J. Data Min. Model. Manag., 3 (4): 406-417 (2011)A Survey of Infeasible Path Detection., , and . ENASE, page 43-52. SciTePress, (2012)Intelligent Mobile Agents for Large-Scale Collaborative Virtual Environment., , , , and . Int. J. Virtual Real., 7 (2): 63-72 (2008)Hippie: A Data-Paralleled Pipeline Approach to Improve Memory-Efficiency and Scalability for Large DNN Training., , , , , , and . ICPP, page 71:1-71:10. ACM, (2021)