Author:
Ceccato M.,Tonella P.,Basile C.,Coppens B.,De Sutter B.,Falcarin P.,Torchiano M.
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-task Learning;Proceedings of the ACM on Software Engineering;2024-07-12
2. Mitigating Debugger-based Attacks to Java Applications with Self-debugging;ACM Transactions on Software Engineering and Methodology;2024-04-18
3. Building a Cybersecurity Knowledge Graph with CyberGraph;Proceedings of the 2024 ACM/IEEE 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) and 2024 IEEE/ACM Second International Workshop on Software Vulnerability;2024-04-15
4. Design, implementation, and automation of a risk management approach for man-at-the-End software protection;Computers & Security;2023-09
5. Unmasking the Shadows;The Palgrave Handbook of Global Social Problems;2023