Author of the publication

To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Functionwith an Existing Exploit.

, , , and . CODASPY, page 97-104. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MIMO Robust Control for HVAC Systems., , , , , , and . IEEE Trans. Control. Syst. Technol., 16 (3): 475-483 (2008)Docker.. IEEE Softw., 32 (3): 102- (2015)Context-Aware Energy Enhancements for Smart Mobile Devices., , , , and . IEEE Trans. Mob. Comput., 13 (8): 1720-1732 (2014)Teaching Computer Based Historical Data Analysis., and . Hist. Comput., 6 (1): 52-58 (1994)Fast Anti-Random (FAR) Test Generation to Improve the Quality of Behavioral Model Verification., , , , and . J. Electron. Test., 18 (6): 583-594 (2002)Adversarial Sampling Attacks Against Phishing Detection., , , and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 83-101. Springer, (2019)Exploiting spatiotemporal and device contexts for energy-efficient mobile embedded systems., , , and . DAC, page 1278-1283. ACM, (2012)EEG subspace analysis and classification using principal angles for Brain-Computer Interfaces., and . CIBCI, page 57-63. IEEE, (2014)On the Use of Neural Networks to Guide Software Testing Activities., , and . ITC, page 720-729. IEEE Computer Society, (1995)MIMO robust control for heating, ventilating and air conditioning (HVAC) systems., , , , , and . CDC, page 167-172. IEEE, (2002)