From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Taint analysis of manual service compositions using Cross-Application Call Graphs., , и . SANER, стр. 585-589. IEEE Computer Society, (2015)Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper)., и . PST, стр. 349-354. IEEE Computer Society, (2017)Soot class loading in the rootbeer GPU compiler., , , , и . SOAP@PLDI, стр. 19-24. ACM, (2013)A High-Level Aspect-Oriented based Language for Software Security Hardening., , и . SECRYPT, стр. 363-370. INSTICC Press, (2007)Towards an Aspect Oriented Approach for the Security Hardening of Code., , и . AINA Workshops (1), стр. 595-600. IEEE Computer Society, (2007)Security Design Patterns: Survey and Evaluation., , , и . CCECE, стр. 1605-1608. IEEE, (2006)A Security Hardening Language Based on Aspect-Orientation., , и . ICETE (Selected Papers), том 23 из Communications in Computer and Information Science, стр. 254-266. Springer, (2007)Control Flow Based Pointcuts for Security Hardening Concerns., , , и . IFIPTM, том 238 из IFIP, стр. 301-316. Springer, (2007)Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité., , , и . Technique et Science Informatiques, 28 (5): 611-644 (2009)Just-in-time detection of protection-impacting changes on WordPress and MediaWiki., , , , и . CASCON, стр. 178-188. ACM, (2018)