Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TestREx: a Framework for Repeatable Exploits., , , and . CoRR, (2017)Scaling up SLA monitoring in pervasive environments., , , and . ESSPE, page 65-68. ACM, (2007)Risk-Aware Information Disclosure., , , and . DPM/SETOP/QASA, volume 8872 of Lecture Notes in Computer Science, page 266-276. Springer, (2014)Impact assessment for vulnerabilities in open-source software libraries., , and . ICSME, page 411-420. IEEE Computer Society, (2015)Negative Complement of a Set of Vulnerability-Fixing Commits: Method and Dataset., , and . EASE, page 446-449. ACM, (2024)Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers., , , , and . EASE, page 429-432. ACM, (2024)Ensuring trust in service consumption through security certification., , and . QASBA, page 40-43. ACM, (2011)A manually-curated dataset of fixes to vulnerabilities of open-source software., , , , and . MSR, page 383-387. IEEE / ACM, (2019)Vulnerable open source dependencies: counting those that matter., , , , and . ESEM, page 42:1-42:10. ACM, (2018)Risk-Based Privacy-Aware Information Disclosure., , , and . Int. J. Secur. Softw. Eng., 6 (2): 70-89 (2015)