Author of the publication

How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes.

, , , , and . USENIX Security Symposium, page 359-376. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks., , , , and . ARES, page 27:1-27:11. ACM, (2021)Asymmetric DCnets for Effective and Efficient Sender Anonymity., , and . GLOBECOM, page 1-7. IEEE, (2018)How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes., , , , and . USENIX Security Symposium, page 359-376. USENIX Association, (2022)Hide And Seek: Detecting Sensors In P2P Botnets, , , , and . IEEE Conference on Communications and Network Security, page 731--732. (2015)Enhancing Privacy via Hierarchical Federated Learning., , , and . EuroS&P Workshops, page 344-347. IEEE, (2020)Poster: Towards Automated Quantitative Analysis and Forecasting of Vulnerability Discoveries in Debian GNU/Linux., , , and . ACM Conference on Computer and Communications Security, page 2677-2679. ACM, (2019)AVAIN - a Framework for Automated Vulnerability Indication for the IoT in IP-based Networks., , , and . NetSys, page 1-3. IEEE, (2019)The Cost of Path Information: Routing in Anonymous Communication., , , and . CCNC, page 1-6. IEEE, (2021)PNet: privacy-preserving personalization of AI-based models by anonymous inter-person similarity networks., , , , and . MobiQuitous, page 60-69. ACM, (2019)Efficient privacy-preserving recommendations based on social graphs., , , and . RecSys, page 78-86. ACM, (2019)