672 results on '"Pretschner, Alexander"'
Search Results
252. Diagnosis of Safety Incidents for Cyber-Physical Systems: A UAV Example
253. Software quality assessment in practice
254. Understanding and Formalizing Accountability for Cyber-Physical Systems
255. Poking the bear: lessons learned from probing three Android malware datasets
256. Repackman: a tool for automatic repackaging of Android apps
257. Automatically assessing vulnerabilities discovered by compositional analysis
258. Pairika
259. Aletheia
260. Data Usage Control for Distributed Systems
261. Improving function coverage with munch
262. Session details: Cloud Security
263. Model-Based Policy Derivation for Usage Control
264. Cross-layer Data-centric Usage Control
265. Chapter One - Security Testing: A Survey
266. Automatic Extraction and Selection of Workload Specifications for Load Testing and Model-Based Performance Prediction
267. Dynamic Symbolic Execution with Scalable Interpolation Based Path Merging
268. Computing refactorings of state machines
269. Dependable Software Systems Engineering
270. A Tutorial on Software Obfuscation
271. Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
272. ACCBench: A Framework for Comparing Causality Algorithms
273. Industrial Evaluation of Search-Based Test Generation Techniques for Control Systems
274. Reducing failure analysis time: an industrial evaluation
275. Session details: Session 1: Threats and Anomaly Detection
276. Detecting Patching of Executables without System Calls
277. Herausforderungen an der Schnittstelle von Informatik und Gesellschaft
278. Challenges of Operationalizing Spectrum-Based Fault Localization from a Data-Centric Perspective
279. Aletheia.
280. Characterizing the Strength of Software Obfuscation Against Automated Attacks
281. A framework for empirical evaluation of malware detection resilience against behavior obfuscation
282. Field Study on the Elicitation and Classification of Defects for Defect Models Pages contribution
283. SHRIFT System-wide HybRid Information Flow Tracking
284. Exploiting Execution Profiles in Software Maintenance and Test
285. Data Usage Control for Distributed Systems
286. Code obfuscation against symbolic execution attacks
287. Generating behavior-based malware detection models with genetic programming
288. VOT4CS
289. Failure Models for Testing Continuous Controllers
290. Towards a Unified Model of Accountability Infrastructures
291. MACKE: compositional analysis of low-level vulnerabilities with symbolic execution
292. MalFlow
293. Nequivack: Assessing Mutation Score Confidence
294. Profiting from Unit Tests for Integration Testing
295. Representation-Independent Data Usage Control
296. 10421 Summary ��� Model-Based Testing in Practice
297. 10421 Abstracts Collection ��� Model-Based Testing in Practice
298. Enhancing Operation Security using Secret Sharing
299. Syntax-Guided Synthesis
300. Model-Based Policy Derivation for Usage Control
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.