From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Exploiting MQTT-SN for Distributed Reflection Denial-of-Service Attacks., , и . DEXA Workshops, том 1285 из Communications in Computer and Information Science, стр. 74-81. Springer, (2020)Automated security test generation for MQTT using attack patterns., , и . ARES, стр. 97:1-97:9. ACM, (2020)A Refinement Based Algorithm for Learning Program Input Grammars., и . DataMod, том 13268 из Lecture Notes in Computer Science, стр. 138-156. Springer, (2021)Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing., , и . CECC, стр. 25:1-25:3. ACM, (2019)Fuzzing-based grammar learning from a minimal set of seed inputs, , и . Journal of Computer Languages, (2024)An Architecture for Automated Security Test Case Generation for MQTT Systems., , и . DEXA Workshops, том 1285 из Communications in Computer and Information Science, стр. 48-62. Springer, (2020)An automated evaluation of broker compatibility for the Message Queuing Telemetry Transport protocol., , и . J. Softw. Evol. Process., (июля 2023)Fuzzing-Based Grammar Inference., , и . MEDI, том 13761 из Lecture Notes in Computer Science, стр. 72-86. Springer, (2022)A PUF-Based Approach for Copy Protection of Intellectual Property in Neural Network Models, , , , и . Software Quality as a Foundation for Security, стр. 153--169. Cham, Springer Nature Switzerland, (2024)