Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Protection as a Risk Analysis Process., , , , and . CoRR, (2020)An Expert System for Automatic Software Protection.. Polytechnic University of Turin, Italy, (2019)Computer-Aided Reverse Engineering of Protected Software., , and . CyberSec4Europe, volume 1807 of Communications in Computer and Information Science, page 3-15. Springer, (2022)Assessment of Source Code Obfuscation Techniques., , , , , , and . SCAM, page 11-20. IEEE Computer Society, (2016)A Privacy-Preserving Approach for Vulnerability Scanning Detection., , and . ITASEC, volume 3731 of CEUR Workshop Proceedings, CEUR-WS.org, (2024)Automated Intel SGX Integration for Enhanced Application Security., and . IEEE Access, (2024)Assessment of Source Code Obfuscation Techniques., , , , , , and . CoRR, (2017)A meta-model for software protections and reverse engineering attacks., , , , and . J. Syst. Softw., (2019)A model of capabilities of Network Security Functions., , , , and . NetSoft, page 474-479. IEEE, (2022)Estimating Software Obfuscation Potency with Artificial Neural Networks., , , and . STM, volume 10547 of Lecture Notes in Computer Science, page 193-202. Springer, (2017)