Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Benefits of Bounded Model Checking at an Industrial Setting., , , , , , and . CAV, volume 2102 of Lecture Notes in Computer Science, page 436-453. Springer, (2001)Accurate Malware Detection by Extreme Abstraction., , , , , and . ACSAC, page 101-111. ACM, (2018)Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device., , , and . CoRR, (2018)Integration of an online voting solution with the SMESEC security framework., , , , , , , , , and 1 other author(s). SysCon, page 1-8. IEEE, (2020)Efficient Debugging in a Formal Verification Environment., , , , and . CHARME, volume 2144 of Lecture Notes in Computer Science, page 275-292. Springer, (2001)Efficient debugging in a formal verification environment., , , , and . Int. J. Softw. Tools Technol. Transf., 4 (3): 335-348 (2003)Deep Ahead-of-Threat Virtual Patching., , , and . IOSec@RAID, volume 11398 of Lecture Notes in Computer Science, page 99-109. Springer, (2018)Formal verification of arbiters using property strengthening and underapproximations., , and . FMCAD, page 21-24. IEEE, (2010)