Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaborative Workflow Management for eGovernment, , and . dexa, (2007)Increasing Trust in the Cloud through Configuration Validation., , and . OTM Workshops, volume 8842 of Lecture Notes in Computer Science, page 210-216. Springer, (2014)LastPyMile: identifying the discrepancy between sources and packages., , , , and . ESEC/SIGSOFT FSE, page 780-792. ACM, (2021)Typosquatting and Combosquatting Attacks on the Python Ecosystem., , , , and . EuroS&P Workshops, page 509-514. IEEE, (2020)Towards Secure Content Based Dissemination of XML Documents., , , and . IAS, page 721-724. IEEE Computer Society, (2009)Configuration Assessment as a Service., , and . DPM/SETOP, volume 7731 of Lecture Notes in Computer Science, page 217-226. Springer, (2012)Transversal Policy Conflict Detection., , and . ESSoS, volume 7159 of Lecture Notes in Computer Science, page 30-37. Springer, (2012)Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies., , , , and . IEEE Trans. Software Eng., 48 (5): 1592-1609 (2022)VulnEx: Exploring Open-Source Software Vulnerabilities in Large Development Organizations to Understand Risk Exposure., , , and . VizSec, page 79-83. IEEE, (2021)Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks., , , and . DIMVA, volume 12223 of Lecture Notes in Computer Science, page 23-43. Springer, (2020)