Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of Asynchronous Systems with an Unspecified Component., , and . CoRR, (2017)ConsiDroid: A Concolic-based Tool for Detecting SQL Injection Vulnerability in Android Apps., , and . CoRR, (2018)Specification and Implementation of Multi-Agent Organizations., , , and . WEBIST (1), page 447-453. INSTICC Press, (2006)Reactive Actors: Isolation for Efficient Analysis of Distributed Systems., , and . DS-RT, page 1-10. IEEE, (2019)Formal Modeling and Analysis of Medical Systems., , and . COORDINATION, volume 12134 of Lecture Notes in Computer Science, page 386-402. Springer, (2020)Mobile App Fingerprinting through Automata Learning and Machine Learning., , , , and . IFIP Networking, page 1-9. IEEE, (2023)Automated Mapping of Reo Circuits to Constraint Automata., , and . FSEN, volume 159 of Electronic Notes in Theoretical Computer Science, page 99-115. Elsevier, (2005)Model Checking MANETs with Arbitrary Mobility., , , and . FSEN, volume 8161 of Lecture Notes in Computer Science, page 217-232. Springer, (2013)Restricted Broadcast Process Theory., , and . SEFM, page 345-354. IEEE Computer Society, (2008)Probabilistic Key Pre-Distribution for Heterogeneous Mobile Ad Hoc Networks Using Subjective Logic., , , and . AINA, page 185-192. IEEE Computer Society, (2015)