Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Design Patterns: Survey and Evaluation., , , and . CCECE, page 1605-1608. IEEE, (2006)Detection of Microgrid Cyberattacks Using Network and System Management., , , , , , and . IEEE Trans. Smart Grid, 14 (3): 2390-2405 (May 2023)BINARM: Scalable and Efficient Detection of Vulnerabilities in Firmware Images of Intelligent Electronic Devices., , , , , , and . DIMVA, volume 10885 of Lecture Notes in Computer Science, page 114-138. Springer, (2018)A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities., , , and . OTM Conferences (2), volume 5871 of Lecture Notes in Computer Science, page 815-832. Springer, (2009)Targeting Security Vulnerabilities: From Specification to Detection (Short Paper)., , , , and . QSIC, page 97-102. IEEE Computer Society, (2008)Towards Automation of Testing High-Level Security Properties., , , and . DBSec, volume 5094 of Lecture Notes in Computer Science, page 268-282. Springer, (2008)AOP Extension for Security Testing of Programs., , , and . CCECE, page 647-650. IEEE, (2006)On Leveraging Coding Habits for Effective Binary Authorship Attribution., , , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 26-47. Springer, (2018)BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables., , , , and . SEC, volume 502 of IFIP Advances in Information and Communication Technology, page 341-355. Springer, (2017)Security Monitoring of the Microgrid Using IEC 62351-7 Network and System Management., , , , , and . ISGT, page 1-5. IEEE, (2022)