Search results for: Johannes Kinder
2016 IEEE Security and Privacy Workshops (SPW) > 252 - 261
Lecture Notes in Computer Science > Verification, Model Checking, and Abstract Interpretation > Submitted Papers > 214-228
Lecture Notes in Computer Science > Computer Aided Verification > Session 11: Tools – Security and Program Analysis > 423-427
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Misuse Detection > 174-187
Lecture Notes in Computer Science > Computer Aided Systems Theory – EUROCAST 2007 > Applied Formal Verification > 497-504
2015 IEEE Symposium on Security and Privacy > 866 - 879
IEEE Transactions on Dependable and Secure Computing > 2010 > 7 > 4 > 424 - 438
Journal of Computer Virology and Hacking Techniques > 2007 > 3 > 4 > 253-265