Nome |
# |
Static analysis of Android Auto infotainment and on‐board diagnostics II apps, file e4239ddd-23cc-7180-e053-3705fe0a3322
|
3.151
|
Vulnerability analysis of android auto infotainment apps, file e4239ddc-c71d-7180-e053-3705fe0a3322
|
1.783
|
Verification, Model Checking, and Abstract Interpretation, file e4239ddb-5328-7180-e053-3705fe0a3322
|
1.030
|
Informatica Umanistica: Una Disciplina di Confine, file e4239ddb-edf1-7180-e053-3705fe0a3322
|
737
|
HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data, file e4239ddd-3256-7180-e053-3705fe0a3322
|
578
|
Advanced computing and systems for security, file e4239ddb-f604-7180-e053-3705fe0a3322
|
572
|
Static analysis of android apps interaction with automotive CAN, file e4239ddc-fdd8-7180-e053-3705fe0a3322
|
525
|
Things as a service: Service model for IoT, file e4239ddd-79bb-7180-e053-3705fe0a3322
|
513
|
Extending Abstract Interpretation to Dependency Analysis of Database Applications, file e4239ddc-b350-7180-e053-3705fe0a3322
|
472
|
ROLAP based data warehouse schema to XML schema conversion, file e4239ddb-ddc2-7180-e053-3705fe0a3322
|
441
|
CIL to Java-bytecode translation for static analysis leveraging, file e4239ddc-c71b-7180-e053-3705fe0a3322
|
404
|
Blockchain transaction analysis using dominant sets, file e4239ddc-5db4-7180-e053-3705fe0a3322
|
386
|
Node localization for indoor tracking using artificial neural network, file e4239ddc-b34f-7180-e053-3705fe0a3322
|
377
|
Sentence Embedding Models for Similarity Detection of Software Requirements, file e4239dde-1597-7180-e053-3705fe0a3322
|
377
|
Completeness of Abstract Domains for String Analysis of JavaScript Programs, file e4239ddd-669b-7180-e053-3705fe0a3322
|
362
|
High performance encapsulation and networking in Casanova 2, file e4239ddc-bf15-7180-e053-3705fe0a3322
|
352
|
A Hierarchical and Abstraction-Based Blockchain Model, file e4239ddd-23cd-7180-e053-3705fe0a3322
|
330
|
High performance encapsulation in Casanova 2, file e4239ddb-d776-7180-e053-3705fe0a3322
|
322
|
A Double Fragmentation Approach for Improving Virtual Primary Key-Based Watermark Synchronization, file e4239ddd-9426-7180-e053-3705fe0a3322
|
321
|
Black Block Recorder: Immutable Black Box Logging for Robots via Blockchain, file e4239ddd-eeb5-7180-e053-3705fe0a3322
|
313
|
A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities, file e4239ddb-6f30-7180-e053-3705fe0a3322
|
302
|
Procedurally Provisioned Access Control for Robotic Systems, file e4239ddd-09d0-7180-e053-3705fe0a3322
|
300
|
Enhancing security in ROS, file e4239ddd-05d4-7180-e053-3705fe0a3322
|
299
|
Computer Information Systems - Analysis and Technologies, file e4239ddb-48c9-7180-e053-3705fe0a3322
|
279
|
Combining symbolic and numerical domains for information leakage analysis, file e4239ddc-b34c-7180-e053-3705fe0a3322
|
273
|
Static analysis for dummies: experiencing LiSA, file e4239dde-51bc-7180-e053-3705fe0a3322
|
265
|
Introduction to the special issue:SAAP-2017 (Static Analysis of Android Apps: Security and Privacy), file e4239ddd-3258-7180-e053-3705fe0a3322
|
253
|
Computer Information Systems and Industrial Management, file e4239ddb-4421-7180-e053-3705fe0a3322
|
252
|
Institutional Change for Gender Equality in Research, file e4239ddd-86e2-7180-e053-3705fe0a3322
|
251
|
Women and Informatics: The Ada Web Portal, file e4239ddb-2c08-7180-e053-3705fe0a3322
|
245
|
From CIL to Java-bytecode: Semantics-based Translation for Static Analysis Leveraging, file e4239ddd-6d75-7180-e053-3705fe0a3322
|
244
|
Twinning Automata and Regular Expressions for String Static Analysis, file e4239dde-189b-7180-e053-3705fe0a3322
|
237
|
String Abstraction for Model Checking of C Programs, file e4239ddd-60bc-7180-e053-3705fe0a3322
|
232
|
Geographic location based dynamic and opportunistic RPL for distributed networks, file e4239ddd-6292-7180-e053-3705fe0a3322
|
232
|
Preventing Additive Attacks to Relational Database Watermarking, file e4239ddd-7028-7180-e053-3705fe0a3322
|
226
|
Preface, file e4239ddd-93a0-7180-e053-3705fe0a3322
|
219
|
MySQL extension automatic porting to PDO for PHP migration and security improvement, file e4239ddd-3cee-7180-e053-3705fe0a3322
|
214
|
Legodroid: A Type-Driven Library for Android and LEGO Mindstorms Interoperability, file e4239ddd-922d-7180-e053-3705fe0a3322
|
213
|
Type-driven cross-programming for android and LEGO Mindstorms interoperability, file e4239ddd-669d-7180-e053-3705fe0a3322
|
204
|
Advanced Computing and Systems for Security - Volume Nine, file e4239ddd-8888-7180-e053-3705fe0a3322
|
201
|
Verification, Model Checking, and AbstractInterpretation, 4th International Conference, VMCAI 2003, file e4239ddb-5c98-7180-e053-3705fe0a3322
|
189
|
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems, file e4239ddd-3353-7180-e053-3705fe0a3322
|
189
|
Validazione di Piani di Disaster Recovery mediante Simulatore, file e4239ddb-3318-7180-e053-3705fe0a3322
|
187
|
Replaceability and negotiation in a cloud service ecosystem, file e4239ddd-60bf-7180-e053-3705fe0a3322
|
184
|
Advanced Computing and Systems for Security - Volume Twelve, file e4239ddd-908a-7180-e053-3705fe0a3322
|
183
|
Information-flow Analysis of Hibernate Query Languages, file e4239ddb-3767-7180-e053-3705fe0a3322
|
157
|
A Survey on Product Operators in Abstract Interpretation, file e4239ddb-354a-7180-e053-3705fe0a3322
|
150
|
Abstracting strings for model checking of C programs, file e4239ddd-fd4f-7180-e053-3705fe0a3322
|
147
|
Introduction to special issue on intelligent computing and adaptive systems, file e4239ddc-934a-7180-e053-3705fe0a3322
|
145
|
Information Flow Analysis for Detecting Non-Determinism in Blockchain, file 0438f4b5-c661-4124-916b-9d1ff86b51fd
|
144
|
Preface, file e4239ddc-bb59-7180-e053-3705fe0a3322
|
142
|
Donne e Tecnologie Informatiche, file e4239ddb-4c5c-7180-e053-3705fe0a3322
|
137
|
An Ontology-based Inquiry Framework., file e4239ddb-57f8-7180-e053-3705fe0a3322
|
135
|
Families_Share: digital and social innovation for work–life balance, file e4239dde-908e-7180-e053-3705fe0a3322
|
133
|
Observation-based Fine Grained Access Control of Data, file e4239ddb-40f1-7180-e053-3705fe0a3322
|
103
|
Preface, file e4239ddc-bb57-7180-e053-3705fe0a3322
|
97
|
Advanced Computing and Systems for Security - Volume Ten, file e4239ddd-9089-7180-e053-3705fe0a3322
|
97
|
Computer Information Systems and Industrial Management, 12th IFIP International Conference, file e4239ddb-34cd-7180-e053-3705fe0a3322
|
92
|
Property Driven Program Slicing, file e4239ddb-2b30-7180-e053-3705fe0a3322
|
73
|
Towards an European Certification of Computer Science Curricula, file e4239ddb-2d49-7180-e053-3705fe0a3322
|
70
|
Advanced Computing and Systems for Security - Volume Five, file e4239ddc-a45f-7180-e053-3705fe0a3322
|
68
|
Semantic-driven watermarking of relational textual databases, file e4239ddd-fbc6-7180-e053-3705fe0a3322
|
59
|
Cross-Programming Language Taint Analysis for the IoT Ecosystem, file e4239ddd-62c0-7180-e053-3705fe0a3322
|
56
|
A Wearable System for Jump Detection in Inline Figure Skating, file e4239dde-9d58-7180-e053-3705fe0a3322
|
48
|
Advanced Computing and Systems for Security - Volume Six, file e4239ddc-ab20-7180-e053-3705fe0a3322
|
45
|
Advanced Computing and Systems for Security - Volume Seven, file e4239ddc-fdda-7180-e053-3705fe0a3322
|
37
|
Static Analysis, file e4239ddb-5329-7180-e053-3705fe0a3322
|
26
|
Context-aware OLAP for textual data warehouses, file dc8b9e83-82f0-46d5-90d4-56726db0e091
|
14
|
La valutazione nei Consigli Regionali, file e4239ddd-05cf-7180-e053-3705fe0a3322
|
11
|
Reducing Multiple Occurrences of Meta-Mark Selection in Relational Data Watermarking, file 59a27935-db8c-4a05-8040-c1f47353b7ba
|
8
|
Driving the Technology Value Stream by Analyzing App Reviews, file 5b8f562b-d7ba-4d92-bd8e-b719df2e20aa
|
8
|
A Quantile-Based Watermarking Approach for Distortion Minimization, file 97881c9a-3df1-4276-944a-017d05e685da
|
6
|
Static analysis for discovering IoT vulnerabilities, file 085b5c7c-e094-464a-b6ed-b1d74fef29b9
|
5
|
Minimising conflicts among run-time non-functional requirements within DevOps, file 28d19df0-d32d-4716-a047-b7f129cbc387
|
5
|
Correlating contexts and NFR conflicts from event logs, file c53fdeed-f5be-4e10-9bb5-d87bc0dfca95
|
5
|
SCARS: Suturing wounds due to conflicts between non-functional requirements in autonomous and robotic systems, file caf05b00-0b23-45fb-943c-c2974460a180
|
4
|
A Two-Hop Neighborhood Based Berserk Detection Algorithm for Probabilistic Model of Consensus in Distributed Ledger Systems, file 360d8a4a-3d78-441d-8b0b-82b550aedb5f
|
2
|
LiSA: A Generic Framework for Multilanguage Static Analysis, file 9f078dbf-4c30-4671-a46c-db4a3a261312
|
2
|
A suite of abstract domains for static analysis of string values, file e4239ddb-34cf-7180-e053-3705fe0a3322
|
2
|
Widening and Narrowing Operators for Abstract Interpretation, file e4239ddb-4e2c-7180-e053-3705fe0a3322
|
2
|
The Domain of Parametric Hypercubes for Static Analysis of Computer Games Software, file e4239ddb-5539-7180-e053-3705fe0a3322
|
2
|
Casanova: A simple, high-performance language for game development, file e4239ddb-aeca-7180-e053-3705fe0a3322
|
2
|
SROS1: Using and Developing Secure ROS1 Systems, file e4239ddc-ad3f-7180-e053-3705fe0a3322
|
2
|
A lightweight mutual and transitive authentication mechanism for IoT network, file 045528ab-2dcd-460d-991d-67d1a89617b8
|
1
|
Ensuring determinism in blockchain software with GoLiSA: an industrial experience report, file 2363de3d-74d6-49b1-a5c7-224ae40bb4e3
|
1
|
Extracting goal models from natural language requirement specifications, file 2a3fef3e-f9f9-430b-9546-a6cdf2126d64
|
1
|
Analyzing information flow in solidity smart contracts, file dd51ec05-dffa-4626-97ad-e58440acb1d3
|
1
|
Lifting String Analysis Domains, file e1ad2580-52b7-4bcf-acf1-e7a5a975b6ce
|
1
|
Specification-based Automatic Verification of Prolog Programs, file e4239ddb-2e09-7180-e053-3705fe0a3322
|
1
|
Distortion-Free Authentication Watermarking, file e4239ddb-2f18-7180-e053-3705fe0a3322
|
1
|
Fine Grained Access Control for Relational Databases by Abstract Interpretation, file e4239ddb-2f19-7180-e053-3705fe0a3322
|
1
|
Property Driven Program Slicing Refinement, file e4239ddb-3085-7180-e053-3705fe0a3322
|
1
|
Typing Legacy COBOL Code, file e4239ddb-4414-7180-e053-3705fe0a3322
|
1
|
Abstract Interpretation of Recursive Queries, file e4239ddb-448d-7180-e053-3705fe0a3322
|
1
|
Abstract Program Slicing of Database Query Languages, file e4239ddb-448e-7180-e053-3705fe0a3322
|
1
|
Abstract program slicing on dependence condition graphs, file e4239ddb-4c16-7180-e053-3705fe0a3322
|
1
|
Modeling the Bullwhip Effect in a Multi-Stage Multi-Tier Retail Network by Generalized Stochastic Petri Nets, file e4239ddb-57aa-7180-e053-3705fe0a3322
|
1
|
Semantic Hierarchy Refactoring by Abstract Interpretation, file e4239ddb-58bd-7180-e053-3705fe0a3322
|
1
|
The abstract domain of Trapezoid Step Functions, file e4239ddb-ac80-7180-e053-3705fe0a3322
|
1
|
BANANA: A tool for Boundary Ambients Nesting ANAlysis, file e4239ddc-99ef-7180-e053-3705fe0a3322
|
1
|
Totale |
21.477 |