Author:
Beschastnikh Ivan,Abrahamson Jenny,Brun Yuriy,Ernst Michael D.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Blindspots in Python and Java APIs Result in Vulnerable Code;ACM Transactions on Software Engineering and Methodology;2023-04-26
2. Capturing Request Execution Path for Understanding Service Behavior and Detecting Anomalies Without Code Instrumentation;IEEE Transactions on Services Computing;2023-03-01
3. Debugging in the brave new world of reconfigurable hardware;Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems;2022-02-22
4. Extracting Formats of Service Messages with Varying Payloads;ACM Transactions on Internet Technology;2022-02
5. Automated Orchestration of Security Chains Driven by Process Learning*;Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning;2021-09-03