Author of the publication

Typosquatting and Combosquatting Attacks on the Python Ecosystem.

, , , , and . EuroS&P Workshops, page 509-514. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 23-43. Springer, (2020)VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure., , , and . VizSec, page 79-83. IEEE, (2021)Configuration Assessment as a Service., , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 217-226. Springer, (2012)Transversal Policy Conflict Detection., , and . ESSoS, volume 7159 of Lecture Notes in Computer Science, page 30-37. Springer, (2012)Impact assessment for vulnerabilities in open-source software libraries., , and . ICSME, page 411-420. IEEE Computer Society, (2015)Collaborative Workflow Management for eGovernment, , and . dexa, (2007)Increasing Trust in the Cloud through Configuration Validation., , and . OTM Workshops, volume 8842 of Lecture Notes in Computer Science, page 210-216. Springer, (2014)LastPyMile: identifying the discrepancy between sources and packages., , , , and . ESEC/SIGSOFT FSE, page 780-792. ACM, (2021)Towards Secure Content Based Dissemination of XML Documents., , , and . IAS, page 721-724. IEEE Computer Society, (2009)Typosquatting and Combosquatting Attacks on the Python Ecosystem., , , , and . EuroS&P Workshops, page 509-514. IEEE, (2020)