Author of the publication

Understanding the How and the Why: Exploring Secure Development Practices through a Course Competition.

, , , , , and . CCS, page 1141-1155. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploiting Spatial Locality and Heterogeneity of Agents for Search and Rescue Teamwork., , , and . J. Field Robotics, 33 (7): 877-900 (2016)Balboa: Bobbing and Weaving around Network Censorship., , and . USENIX Security Symposium, page 3399-3413. USENIX Association, (2021)Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities., , , , and . USENIX Security Symposium, page 6525-6540. USENIX Association, (2023)Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It., , , , , and . USENIX Security Symposium, page 109-126. USENIX Association, (2020)On intrusion detection and response for mobile ad hoc networks., , , and . IPCCC, page 747-752. IEEE, (2004)A 60GHz CMOS phased-array transceiver pair for multi-Gb/s wireless communications., , , , , , , , , and 2 other author(s). ISSCC, page 164-166. IEEE, (2011)Tasks with cost growing over time and agent reallocation delays., and . AAMAS, page 381-388. IFAAMAS/ACM, (2014)Advanced Language-based Techniques for Correct, Secure Networked Systems.. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26387).Verifying replicated data types with typeclass refinements in Liquid Haskell., , , , , and . Proc. ACM Program. Lang., 4 (OOPSLA): 216:1-216:30 (2020)Distributed Multi-Level Recovery in Main-Memory Databases., , , , , and . PDIS, page 44-55. IEEE Computer Society, (1996)