Nome |
# |
Static analysis of Android Auto infotainment and on‐board diagnostics II apps, file e4239ddd-23cc-7180-e053-3705fe0a3322
|
2.910
|
Vulnerability analysis of android auto infotainment apps, file e4239ddc-c71d-7180-e053-3705fe0a3322
|
1.666
|
Verification, Model Checking, and Abstract Interpretation, file e4239ddb-5328-7180-e053-3705fe0a3322
|
1.020
|
Advanced computing and systems for security, file e4239ddb-f604-7180-e053-3705fe0a3322
|
567
|
Informatica Umanistica: Una Disciplina di Confine, file e4239ddb-edf1-7180-e053-3705fe0a3322
|
565
|
Things as a service: Service model for IoT, file e4239ddd-79bb-7180-e053-3705fe0a3322
|
525
|
HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data, file e4239ddd-3256-7180-e053-3705fe0a3322
|
520
|
Static analysis of android apps interaction with automotive CAN, file e4239ddc-fdd8-7180-e053-3705fe0a3322
|
493
|
Extending Abstract Interpretation to Dependency Analysis of Database Applications, file e4239ddc-b350-7180-e053-3705fe0a3322
|
457
|
ROLAP based data warehouse schema to XML schema conversion, file e4239ddb-ddc2-7180-e053-3705fe0a3322
|
434
|
Blockchain transaction analysis using dominant sets, file e4239ddc-5db4-7180-e053-3705fe0a3322
|
378
|
Node localization for indoor tracking using artificial neural network, file e4239ddc-b34f-7180-e053-3705fe0a3322
|
372
|
Completeness of Abstract Domains for String Analysis of JavaScript Programs, file e4239ddd-669b-7180-e053-3705fe0a3322
|
352
|
CIL to Java-bytecode translation for static analysis leveraging, file e4239ddc-c71b-7180-e053-3705fe0a3322
|
348
|
High performance encapsulation and networking in Casanova 2, file e4239ddc-bf15-7180-e053-3705fe0a3322
|
342
|
High performance encapsulation in Casanova 2, file e4239ddb-d776-7180-e053-3705fe0a3322
|
323
|
A Hierarchical and Abstraction-Based Blockchain Model, file e4239ddd-23cd-7180-e053-3705fe0a3322
|
323
|
Procedurally Provisioned Access Control for Robotic Systems, file e4239ddd-09d0-7180-e053-3705fe0a3322
|
302
|
A New Intrusion Prevention System for Protecting Smart Grids from ICMPv6 Vulnerabilities, file e4239ddb-6f30-7180-e053-3705fe0a3322
|
300
|
Computer Information Systems - Analysis and Technologies, file e4239ddb-48c9-7180-e053-3705fe0a3322
|
281
|
Black Block Recorder: Immutable Black Box Logging for Robots via Blockchain, file e4239ddd-eeb5-7180-e053-3705fe0a3322
|
277
|
Combining symbolic and numerical domains for information leakage analysis, file e4239ddc-b34c-7180-e053-3705fe0a3322
|
267
|
Enhancing security in ROS, file e4239ddd-05d4-7180-e053-3705fe0a3322
|
266
|
Computer Information Systems and Industrial Management, file e4239ddb-4421-7180-e053-3705fe0a3322
|
254
|
Introduction to the special issue:SAAP-2017 (Static Analysis of Android Apps: Security and Privacy), file e4239ddd-3258-7180-e053-3705fe0a3322
|
250
|
Women and Informatics: The Ada Web Portal, file e4239ddb-2c08-7180-e053-3705fe0a3322
|
245
|
Sentence Embedding Models for Similarity Detection of Software Requirements, file e4239dde-1597-7180-e053-3705fe0a3322
|
239
|
Institutional Change for Gender Equality in Research, file e4239ddd-86e2-7180-e053-3705fe0a3322
|
230
|
Geographic location based dynamic and opportunistic RPL for distributed networks, file e4239ddd-6292-7180-e053-3705fe0a3322
|
226
|
Preventing Additive Attacks to Relational Database Watermarking, file e4239ddd-7028-7180-e053-3705fe0a3322
|
224
|
Preface, file e4239ddd-93a0-7180-e053-3705fe0a3322
|
220
|
Twinning Automata and Regular Expressions for String Static Analysis, file e4239dde-189b-7180-e053-3705fe0a3322
|
220
|
Legodroid: A Type-Driven Library for Android and LEGO Mindstorms Interoperability, file e4239ddd-922d-7180-e053-3705fe0a3322
|
217
|
String Abstraction for Model Checking of C Programs, file e4239ddd-60bc-7180-e053-3705fe0a3322
|
215
|
Static analysis for dummies: experiencing LiSA, file e4239dde-51bc-7180-e053-3705fe0a3322
|
214
|
MySQL extension automatic porting to PDO for PHP migration and security improvement, file e4239ddd-3cee-7180-e053-3705fe0a3322
|
207
|
Type-driven cross-programming for android and LEGO Mindstorms interoperability, file e4239ddd-669d-7180-e053-3705fe0a3322
|
202
|
Advanced Computing and Systems for Security - Volume Nine, file e4239ddd-8888-7180-e053-3705fe0a3322
|
199
|
Verification, Model Checking, and AbstractInterpretation, 4th International Conference, VMCAI 2003, file e4239ddb-5c98-7180-e053-3705fe0a3322
|
191
|
A Double Fragmentation Approach for Improving Virtual Primary Key-Based Watermark Synchronization, file e4239ddd-9426-7180-e053-3705fe0a3322
|
189
|
Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems, file e4239ddd-3353-7180-e053-3705fe0a3322
|
183
|
Replaceability and negotiation in a cloud service ecosystem, file e4239ddd-60bf-7180-e053-3705fe0a3322
|
182
|
Advanced Computing and Systems for Security - Volume Twelve, file e4239ddd-908a-7180-e053-3705fe0a3322
|
179
|
From CIL to Java-bytecode: Semantics-based Translation for Static Analysis Leveraging, file e4239ddd-6d75-7180-e053-3705fe0a3322
|
159
|
Information-flow Analysis of Hibernate Query Languages, file e4239ddb-3767-7180-e053-3705fe0a3322
|
154
|
A Survey on Product Operators in Abstract Interpretation, file e4239ddb-354a-7180-e053-3705fe0a3322
|
153
|
Abstracting strings for model checking of C programs, file e4239ddd-fd4f-7180-e053-3705fe0a3322
|
151
|
Introduction to special issue on intelligent computing and adaptive systems, file e4239ddc-934a-7180-e053-3705fe0a3322
|
144
|
Preface, file e4239ddc-bb59-7180-e053-3705fe0a3322
|
143
|
Validazione di Piani di Disaster Recovery mediante Simulatore, file e4239ddb-3318-7180-e053-3705fe0a3322
|
139
|
An Ontology-based Inquiry Framework., file e4239ddb-57f8-7180-e053-3705fe0a3322
|
125
|
Families_Share: digital and social innovation for work–life balance, file e4239dde-908e-7180-e053-3705fe0a3322
|
123
|
Information Flow Analysis for Detecting Non-Determinism in Blockchain, file 0438f4b5-c661-4124-916b-9d1ff86b51fd
|
107
|
Donne e Tecnologie Informatiche, file e4239ddb-4c5c-7180-e053-3705fe0a3322
|
103
|
Observation-based Fine Grained Access Control of Data, file e4239ddb-40f1-7180-e053-3705fe0a3322
|
99
|
Preface, file e4239ddc-bb57-7180-e053-3705fe0a3322
|
96
|
Advanced Computing and Systems for Security - Volume Ten, file e4239ddd-9089-7180-e053-3705fe0a3322
|
92
|
Computer Information Systems and Industrial Management, 12th IFIP International Conference, file e4239ddb-34cd-7180-e053-3705fe0a3322
|
90
|
Towards an European Certification of Computer Science Curricula, file e4239ddb-2d49-7180-e053-3705fe0a3322
|
72
|
Property Driven Program Slicing, file e4239ddb-2b30-7180-e053-3705fe0a3322
|
71
|
Advanced Computing and Systems for Security - Volume Five, file e4239ddc-a45f-7180-e053-3705fe0a3322
|
68
|
A Wearable System for Jump Detection in Inline Figure Skating, file e4239dde-9d58-7180-e053-3705fe0a3322
|
50
|
Advanced Computing and Systems for Security - Volume Six, file e4239ddc-ab20-7180-e053-3705fe0a3322
|
46
|
Cross-Programming Language Taint Analysis for the IoT Ecosystem, file e4239ddd-62c0-7180-e053-3705fe0a3322
|
44
|
Advanced Computing and Systems for Security - Volume Seven, file e4239ddc-fdda-7180-e053-3705fe0a3322
|
31
|
Static Analysis, file e4239ddb-5329-7180-e053-3705fe0a3322
|
27
|
Semantic-driven watermarking of relational textual databases, file e4239ddd-fbc6-7180-e053-3705fe0a3322
|
16
|
La valutazione nei Consigli Regionali, file e4239ddd-05cf-7180-e053-3705fe0a3322
|
11
|
Context-aware OLAP for textual data warehouses, file dc8b9e83-82f0-46d5-90d4-56726db0e091
|
8
|
A Quantile-Based Watermarking Approach for Distortion Minimization, file 97881c9a-3df1-4276-944a-017d05e685da
|
5
|
Reducing Multiple Occurrences of Meta-Mark Selection in Relational Data Watermarking, file 59a27935-db8c-4a05-8040-c1f47353b7ba
|
4
|
Driving the Technology Value Stream by Analyzing App Reviews, file 5b8f562b-d7ba-4d92-bd8e-b719df2e20aa
|
3
|
Fine Grained Access Control for Relational Databases by Abstract Interpretation, file e4239ddb-2f19-7180-e053-3705fe0a3322
|
2
|
A suite of abstract domains for static analysis of string values, file e4239ddb-34cf-7180-e053-3705fe0a3322
|
2
|
Widening and Narrowing Operators for Abstract Interpretation, file e4239ddb-4e2c-7180-e053-3705fe0a3322
|
2
|
The Domain of Parametric Hypercubes for Static Analysis of Computer Games Software, file e4239ddb-5539-7180-e053-3705fe0a3322
|
2
|
Casanova: A simple, high-performance language for game development, file e4239ddb-aeca-7180-e053-3705fe0a3322
|
2
|
SROS1: Using and Developing Secure ROS1 Systems, file e4239ddc-ad3f-7180-e053-3705fe0a3322
|
2
|
Minimising conflicts among run-time non-functional requirements within DevOps, file 28d19df0-d32d-4716-a047-b7f129cbc387
|
1
|
LiSA: A Generic Framework for Multilanguage Static Analysis, file 9f078dbf-4c30-4671-a46c-db4a3a261312
|
1
|
Correlating contexts and NFR conflicts from event logs, file c53fdeed-f5be-4e10-9bb5-d87bc0dfca95
|
1
|
Specification-based Automatic Verification of Prolog Programs, file e4239ddb-2e09-7180-e053-3705fe0a3322
|
1
|
Complexity of Nesting Analysis in Mobile Ambients, file e4239ddb-2ec8-7180-e053-3705fe0a3322
|
1
|
Distortion-Free Authentication Watermarking, file e4239ddb-2f18-7180-e053-3705fe0a3322
|
1
|
KPI-Supported PDCA Model for Innovation Policy Management in Local Government, file e4239ddb-301e-7180-e053-3705fe0a3322
|
1
|
Property Driven Program Slicing Refinement, file e4239ddb-3085-7180-e053-3705fe0a3322
|
1
|
A Generic Distortion Free Watermarking Technique for Relational Databases, file e4239ddb-3319-7180-e053-3705fe0a3322
|
1
|
Typing Legacy COBOL Code, file e4239ddb-4414-7180-e053-3705fe0a3322
|
1
|
Abstract Interpretation of Recursive Queries, file e4239ddb-448d-7180-e053-3705fe0a3322
|
1
|
Abstract Program Slicing of Database Query Languages, file e4239ddb-448e-7180-e053-3705fe0a3322
|
1
|
Abstract program slicing on dependence condition graphs, file e4239ddb-4c16-7180-e053-3705fe0a3322
|
1
|
The quotient of an abstract interpretation, file e4239ddb-52b6-7180-e053-3705fe0a3322
|
1
|
Abstract interpretation for sound approximation of database query languages, file e4239ddb-56e8-7180-e053-3705fe0a3322
|
1
|
Modeling the Bullwhip Effect in a Multi-Stage Multi-Tier Retail Network by Generalized Stochastic Petri Nets, file e4239ddb-57aa-7180-e053-3705fe0a3322
|
1
|
Semantic Hierarchy Refactoring by Abstract Interpretation, file e4239ddb-58bd-7180-e053-3705fe0a3322
|
1
|
The abstract domain of Trapezoid Step Functions, file e4239ddb-ac80-7180-e053-3705fe0a3322
|
1
|
BANANA: A tool for Boundary Ambients Nesting ANAlysis, file e4239ddc-99ef-7180-e053-3705fe0a3322
|
1
|
Penetration testing ROS, file e4239ddd-09d2-7180-e053-3705fe0a3322
|
1
|
Cross-Program Taint Analysis for IoT Systems, file e4239ddd-6060-7180-e053-3705fe0a3322
|
1
|
HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data, file e4239ddd-f934-7180-e053-3705fe0a3322
|
1
|
Totale |
19.942 |