From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Problems and Solutions in Applying Continuous Integration and Delivery to 20 Open-Source Cyber-Physical Systems., , и . MSR, стр. 646-657. ACM, (2022)Hey Malware, I Can Find You!, , , и . WETICE, стр. 261-262. IEEE Computer Society, (2016)Formal Verification of Radio Communication Management in Railway Systems Using Model Checking Technique., , , и . WETICE, стр. 249-254. IEEE, (2019)Identifying Mobile Repackaged Applications through Formal Methods., , , , и . ICISSP, стр. 673-682. SciTePress, (2017)Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour., , , и . ARES, стр. 76:1-76:6. ACM, (2017)Spyware Detection using Temporal Logic., , , , и . ICISSP, стр. 690-699. SciTePress, (2019)Ransomware Steals Your Phone. Formal Methods Rescue It., , , и . FORTE, том 9688 из Lecture Notes in Computer Science, стр. 212-221. Springer, (2016)Infer Gene Regulatory Networks from Time Series Data with Probabilistic Model Checking., , , , и . FormaliSE@ICSE, стр. 26-32. IEEE Computer Society, (2015)Model Checking for Mobile Android Malware Evolution., , , , , и . FormaliSE@ICSE, стр. 24-30. IEEE, (2017)Context-Awareness Mobile Devices for Traffic Incident Prevention., , , , и . PerCom Workshops, стр. 143-148. IEEE Computer Society, (2018)