From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poking the bear: lessons learned from probing three Android malware datasets., и . A-Mobile@ASE, стр. 19-24. ACM, (2018)Ethics in the Software Development Process: From Codes of Conduct to Ethical Deliberation., , , , , и . CoRR, (2020)Mechanisms for usage control., , , , и . AsiaCCS, стр. 240-244. ACM, (2008)Defining a Software Maintainability Dataset: Collecting, Aggregating and Analysing Expert Evaluations of Software Maintainability., , и . ICSME, стр. 278-289. IEEE, (2020)From Checking to Inference: Actual Causality Computations as Optimization Problems., и . ATVA, том 12302 из Lecture Notes in Computer Science, стр. 343-359. Springer, (2020)A Taxonomy of Model-Based Testing Approaches, , и . Softw. Test. Verif. Reliab., 22 (5): 297–312 (2012)BinaryRTS: Cross-language Regression Test Selection for C++ Binaries in CI., , , , , , и . ICST, стр. 327-338. IEEE, (2023)Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning., , и . USENIX Security Symposium, стр. 661-678. USENIX Association, (2017)Why Did the Test Execution Fail? Failure Classification Using Association Rules (Practical Experience Report)., , , и . ISSRE, стр. 517-528. IEEE, (2022)Vorwort zum Doktorandensymposium der Modellierung 2008., и . Modellierung, том P-127 из LNI, стр. 215-216. GI, (2008)