Author of the publication

Test Coverage Optimization for Large Code Problems.

, , , , , , and . AINA Workshops, page 215-220. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Test Coverage Optimization for Large Code Problems., , , , , , and . AINA Workshops, page 215-220. IEEE Computer Society, (2012)Gyrus: A Framework for User-Intent Monitoring of Text-based Networked Applications., , , and . NDSS, The Internet Society, (2014)Collaborative Intrusion Prevention., and . WETICE, page 395-400. IEEE Computer Society, (2007)The LAIDS/LIDS Framework for Systematic IPS Design., and . IWIA, page 3-11. IEEE Computer Society, (2006)The Price of Free: Privacy Leakage in Personalized Mobile In-Apps Ads., , , , and . NDSS, The Internet Society, (2016)On the Feasibility of Large-Scale Infections of iOS Devices., , , , , and . USENIX Security Symposium, page 79-93. USENIX Association, (2014)Mimesis Aegis: A Mimicry Privacy Shield-A System's Approach to Data Privacy on Public Cloud., , , , , and . USENIX Security Symposium, page 33-48. USENIX Association, (2014)Swarm Attacks against Network-Level Emulation/Analysis., and . RAID, volume 5230 of Lecture Notes in Computer Science, page 175-190. Springer, (2008)Allergy Attack Against Automatic Signature Generation., and . RAID, volume 4219 of Lecture Notes in Computer Science, page 61-80. Springer, (2006)On Random-Inspection-Based Intrusion Detection., and . RAID, volume 3858 of Lecture Notes in Computer Science, page 165-184. Springer, (2005)