Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated security test generation for MQTT using attack patterns., , and . ARES, page 97:1-97:9. ACM, (2020)Exploiting MQTT-SN for Distributed Reflection Denial-of-Service Attacks., , and . DEXA Workshops, volume 1285 of Communications in Computer and Information Science, page 74-81. Springer, (2020)A Refinement Based Algorithm for Learning Program Input Grammars., and . DataMod, volume 13268 of Lecture Notes in Computer Science, page 138-156. Springer, (2021)Fuzzing-based grammar learning from a minimal set of seed inputs, , and . Journal of Computer Languages, (2024)Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing., , and . CECC, page 25:1-25:3. ACM, (2019)An Architecture for Automated Security Test Case Generation for MQTT Systems., , and . DEXA Workshops, volume 1285 of Communications in Computer and Information Science, page 48-62. Springer, (2020)An automated evaluation of broker compatibility for the Message Queuing Telemetry Transport protocol., , and . J. Softw. Evol. Process., (July 2023)Fuzzing-Based Grammar Inference., , and . MEDI, volume 13761 of Lecture Notes in Computer Science, page 72-86. Springer, (2022)A PUF-Based Approach for Copy Protection of Intellectual Property in Neural Network Models, , , , and . Software Quality as a Foundation for Security, page 153--169. Cham, Springer Nature Switzerland, (2024)