Author of the publication

Model Checking An Entire Linux Distribution for Security Violations.

, , , , , , and . ACSAC, page 13-22. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Potential Impact of Solar Energy Penetration on PJM Electricity Market.. IEEE Systems Journal, 6 (2): 205-212 (2012)Class Firewall, Test Order, and Regression Testing of Object-Oriented Programs., , , , and . JOOP, 8 (2): 51-65 (1995)Model Checking An Entire Linux Distribution for Security Violations., , , , , , and . ACSAC, page 13-22. IEEE Computer Society, (2005)Integrating the first HVDC-based offshore wind power into PJM system - A real project case study.. IAS, page 1-8. IEEE, (2015)Event-driven Security-Constrained Unit Commitment., , and . ISGT, page 1-5. IEEE, (2016)A Framework for Expansion Planning of Data Centers in Electricity and Data Networks Under Uncertainty., , , , and . IEEE Trans. Smart Grid, 10 (1): 305-316 (2019)Pediatric rehabilitation with the reachMAN's modular handle., , , , , , and . EMBC, page 3933-3936. IEEE, (2015)A Novel Motion Detection Method Using 3D Discrete Wavelet Transform., , , and . IEEE Trans. Circuits Syst. Video Techn., 29 (12): 3487-3500 (2019)Simplifying the development of network management systems in a distributed environment., , , , , and . NOMS, page 549-558. IEEE, (1998)Design Recovery for Software Testing of Object-Oriented Programs., , , , and . WCRE, page 202-211. IEEE Computer Society, (1993)