1. One technique is not enough: a comparison of vulnerability discovery techniques;Austin,2011
2. Static checking of interrupt-driven software;Brylow,2001
3. Unleashing mayhem on binary code;Cha,2012
4. Automated dynamic firmware analysis at scale: a case study on embedded web interfaces;Costin,2015
5. Towards a model-driven-architecture process for smart grid projects;Dänekas,2014