From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

ALETHEIA: Improving the Usability of Static Security Analysis., , , и . ACM Conference on Computer and Communications Security, стр. 762-774. ACM, (2014)A Bayesian Approach to Privacy Enforcement in Smartphones., и . USENIX Security Symposium, стр. 175-190. USENIX Association, (2014)Cognitive mobile security: invited conference keynote., , , и . MOBILESoft, стр. 267-268. ACM, (2016)Path- and index-sensitive string analysis based on monadic second-order logic., , и . ISSTA, стр. 166-176. ACM, (2011)Long-term Static Analysis Rule Quality Monitoring Using True Negatives., , , , , и . ICSE-SEIP, стр. 315-326. IEEE, (2023)A Deep Dive into Large Language Models for Automated Bug Localization and Repair., , , , , , , и . CoRR, (2024)Access-rights Analysis in the Presence of Subjects., , и . ECOOP, том 37 из LIPIcs, стр. 222-246. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2015)Andromeda: Accurate and Scalable Security Analysis of Web Applications., , , , и . FASE, том 7793 из Lecture Notes in Computer Science, стр. 210-225. Springer, (2013)Finding your way in the testing jungle: a learning approach to web security testing., , и . ISSTA, стр. 347-357. ACM, (2013)Tightfit: adaptive parallelization with foresight., и . ESEC/SIGSOFT FSE, стр. 169-179. ACM, (2013)