Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A type-safe embedding of SQL into Java using the extensible compiler framework J%., , , and . Comput. Lang. Syst. Struct., (2015)Fortifying Applications Against Xpath Injection Attacks., , and . MCIS, page 95. Athens University of Economics and Business / AISeL, (2009)Security bugs in large software ecosystems.. ACM Crossroads, 20 (2): 15-16 (2013)Better safe than sorry: backup your backups.. ACM Crossroads, 18 (4): 6 (2012)On the evolution of security bugs.. ACM Crossroads, 21 (3): 18-19 (2015)A Replication Package for PyCG: Practical Call Graph Generation in Python., , , , and . ICSE (Companion Volume), page 200. IEEE, (2021)Syntax-Aware Mutation for Testing the Solidity Compiler., , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 327-347. Springer, (2023)Cyberdiversity: Measures and Initial Results., , and . Panhellenic Conference on Informatics, page 135-140. IEEE Computer Society, (2010)Securing Legacy Code with the TRACER Platform., , , , , , , and . Panhellenic Conference on Informatics, page 26:1-26:6. ACM, (2014)The bug catalog of the maven ecosystem., , , , and . MSR, page 372-375. ACM, (2014)