Next Conference
ISSTA '24
- Sponsor:
- sigsoft
Abstract
No abstract available.
Cited By
- Ren K, Qiang W, Wu Y, Zhou Y, Zou D and Jin H An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, (1420-1432)
- Mahmoodi M, Nili H, Larimian S, Guo X and Strukov D ChipSecure Proceedings of the 56th Annual Design Automation Conference 2019, (1-6)
-
Barci M, Fantini A, Redolfi A, Kundu S, Belmonte A, Devulder W, Opsomer K, Delhougne R, Goux L, Sankar Kar G and Witters T (2018). Engineering and Stack Optimization of Cu -Based Selector Devices for Low Power SCM Applications 2018 IEEE International Memory Workshop (IMW), 10.1109/IMW.2018.8388827, 978-1-5386-5247-3, (1-4)
- Li Z, He C and Yang S On the capacity of the two-user erasure broadcast channel with mixed CSIT 2017 IEEE Information Theory Workshop (ITW), (499-503)
-
Boehm J, Voll D and Zülch H (2017). The hardest cycle climb at TCC: A financial instruments case, Corporate Ownership and Control, 10.22495/cocv15i1c2p8, 15:1-2, (387-396),
Index Terms
- Proceedings of the 2015 International Symposium on Software Testing and Analysis