Author of the publication

Static Analysis of Android Apps Interaction with Automotive CAN.

, , , , and . SmartCom, volume 11344 of Lecture Notes in Computer Science, page 114-123. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sentence Embedding Models for Similarity Detection of Software Requirements., , , and . SN Comput. Sci., 2 (1): 69 (2021)The Quotient of an Abstract Interpretation., , and . Theor. Comput. Sci., 202 (1-2): 163-192 (1998)KPI-Supported PDCA Model for Innovation Policy Management in Local Government., and . EGOV, volume 6846 of Lecture Notes in Computer Science, page 320-331. Springer, (2011)A Generic Distortion Free Watermarking Technique for Relational Databases., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 252-264. Springer, (2009)Ensuring determinism in blockchain software with GoLiSA: an industrial experience report., , , , , , , , and . SOAP@PLDI, page 23-29. ACM, (2022)Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis, , and . LICS, page 322-327. IEEE Computer Society, (1991)Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems., , , , , , and . EuroS&P Workshops, page 57-66. IEEE, (2019)Distortion-Free Authentication Watermarking., and . ICSOFT (Selected Papers), volume 170 of Communications in Computer and Information Science, page 205-219. Springer, (2010)Boundary Inference for Enforcing Security Policies in Mobile Ambients., , , and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 383-395. Kluwer, (2002)Non-repudiation analysis using LySa with annotations., and . Comput. Lang. Syst. Struct., 36 (4): 352-377 (2010)