Author of the publication

POSTER: A Measurement Framework to Quantify Software Protections.

, , , and . ACM Conference on Computer and Communications Security, page 1505-1507. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Web Testing: a Roadmap for the Empirical Research., and . WSE, page 63-70. IEEE Computer Society, (2005)Distributing Trust Verification to Increase Application Performance., , and . PDP, page 604-610. IEEE Computer Society, (2008)Reverse Engineering of the UML Class Diagram from C++ Code in Presence of Weakly Typed Containers., and . ICSM, page 376-385. IEEE Computer Society, (2001)Barrier Slicing for Remote Software Trusting., , , , and . SCAM, page 27-36. IEEE Computer Society, (2007)Modeling Client/Server Interactions by Means of Dynamic Systems., and . EUROMICRO, page 20499-20505. IEEE Computer Society, (1998)Points-to Analysis for Program Understanding., , , and . WPC, page 90-99. IEEE Computer Society, (1997)Reverse engineering 4.7 million lines of code., , , and . Softw., Pract. Exper., 30 (2): 129-150 (2000)Recovering structured data types from a legacy data model with overlays., , and . Information & Software Technology, 51 (10): 1454-1468 (2009)Maintenance and testing effort modeled by linear and nonlinear dynamic systems., , and . Information & Software Technology, 43 (8): 477-486 (2001)Nomen Est Omen: Analyzing the Language of Function Identifiers., and . WCRE, page 112-122. IEEE Computer Society, (1999)