Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A key distribution protocol for Wireless Sensor Networks., and . LCN, page 140-143. IEEE Computer Society, (2012)Magma: A Ground-Truth Fuzzing Benchmark., , and . SIGMETRICS (Abstracts), page 81-82. ACM, (2021)JMD: A Hybrid Approach for Detecting Java Malware., and . AISC, volume 161 of CRPIT, page 3-13. Australian Computer Society, (2015)Optimizing Away JavaScript Obfuscation.. SCAM, page 215-220. IEEE, (2020)MoonLight: Effective Fuzzing with Near-Optimal Corpus Distillation., , , , , , , and . CoRR, (2019)Discover deeper bugs with dynamic symbolic execution and coverage-based fuzz testing., , , , , and . IET Softw., 12 (6): 507-519 (2018)Evocatio: Conjuring Bug Capabilities from a Single PoC., , , , , , , , and . CCS, page 1599-1613. ACM, (2022)A Simulator for Intelligent Workload Managers in Heterogeneous Clusters., , , and . CCGRID, page 196-205. IEEE, (2021)Seed selection for successful fuzzing., , , , , and . ISSTA, page 230-243. ACM, (2021)'Framework' basado en imágenes parametrizadas sobre ResNet para identificar intrusiones en 'smartwatches' u otros dispositivos afines. (Un eje singular de la publicación «Estado del arte de la ciencia de datos en el idioma español y su aplicación en el campo de la Inteligencia Artificial»), , , , , , , , and . IA eñ ™, (July 2021)