Author of the publication

Identifying privacy weaknesses from multi-party trigger-action integration platforms.

, , , , , , , and . ISSTA, page 2-15. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reasoning Support for SWRL-FOL Using Alloy., , and . SEKE, page 626-631. (2005)N-PAT: A Nested Model-Checker - (System Description)., , , , , , and . IJCAR (2), volume 12167 of Lecture Notes in Computer Science, page 369-377. Springer, (2020)An Object-Oriented Approach to the Formal Specification of ODP Trader., and . Open Distributed Processing, volume C-20 of IFIP Transactions, page 341-352. North-Holland, (1993)Quantitative methods in security and safety critical applications (NII Shonan Meeting 2012-10)., , and . NII Shonan Meet. Rep., (2012)Introduction to Nature-Inspired Algorithms., and . Nature-Inspired Optimizers, volume 811 of Studies in Computational Intelligence, Springer, (2019)Preface., , , and . WLFM@FM, volume 151 of Electronic Notes in Theoretical Computer Science, page 1. Elsevier, (2005)Using Monterey Phoenix to Formalize and Verify System Architectures., , , , and . APSEC, page 644-653. IEEE, (2012)Model Driven Inputs to aid Athlete's Decision Making., , , , and . APSEC, page 485-489. IEEE, (2020)Enhancing Semantic Web Services with Inheritance., , , , , and . ISWC, volume 5318 of Lecture Notes in Computer Science, page 162-177. Springer, (2008)Empower Post-hoc Graph Explanations with Information Bottleneck: A Pre-training and Fine-tuning Perspective., , , , , , and . KDD, page 2349-2360. ACM, (2023)