Author of the publication

Verification of CERT Secure Coding Rules: Case Studies.

, , , and . OTM Conferences (2), volume 5871 of Lecture Notes in Computer Science, page 913-930. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Total Variation for Image Denoising Based on a Novel Smart Edge Detector: An Application to Medical Images., , and . Journal of Mathematical Imaging and Vision, 61 (1): 106-121 (2019)Efficient techniques for energy saving in data center networks., , , , and . Comput. Commun., (2018)Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management., , , , , , , and . IEEE Trans. Ind. Informatics, 18 (3): 1641-1653 (2022)Sentiment Analysis as a Service: A Social Media Based Sentiment Analysis Framework., , , , and . ICWS, page 660-667. IEEE, (2017)An automated approach to translate a biological process from ODEs into graphical hybrid functional Petri Nets., , and . CIBCB, page 1-8. IEEE, (2017)Gravitational weighted fuzzy c-means with application on multispectral image segmentation., , and . IPTA, page 92-96. IEEE, (2014)Exploiting Traffic Correlation Towards Energy Saving in Data Centers., , , , and . PIMRC, page 1-7. IEEE, (2018)On Modelling and Analyzing Composite Resources' Consumption Cycles using Time Petri-Nets., , , , and . ENASE, page 243-250. SCITEPRESS, (2022)On-the-fly TCTL model checking for Time Petri Nets using state class graphs., and . ACSD, page 111-122. IEEE Computer Society, (2006)Towards an integrated e-mail forensic analysis framework., , , , , and . Digit. Investig., 5 (3-4): 124-137 (2009)