Search results for: Akira Mori
Lecture Notes in Computer Science > Software Security — Theories and Systems > Verification Methods and Tools > 461-470
Lecture Notes in Computer Science > Software Security - Theories and Systems > Part 4: Secure Execution Environments > 226-241
Lecture Notes in Computer Science > Advances in Information and Computer Security > Network Security > 199-216
Lecture Notes in Computer Science > Fundamental Approaches to Software Engineering > Software Evolution > 91-106
2012 Proceedings of SICE Annual Conference (SICE) > 1791 - 1794