Reliably Secure Software Systems (RS3) –
DFG Priority Programme 1496

Export 56 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
C. Scheben and Schmitt, P., Verification of Information Flow Properties of Java Programs without Approximations, in Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011), 2012.
C. Scheben and Schmitt, P., Verification of Information Flow Properties of Java Programs without Approximations, in Proceedings of the Formal Verification of Object-Oriented Software (FoVeOOS 2011), 2012.
B. Finkbeiner, Müller, C., Seidl, H., and Zalinescu, E., Verifying Security Policies in Multi-agent Workflows with Loops, in Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), 2017.
W
I. Schmitt and Schinzel, S., WAFFle: Fingerprinting Filter Rules of Web Application Firewalls, in {6th USENIX Workshop on Offensive Technologies (WOOT 2012)}, 2012.
I. Schmitt and Schinzel, S., WAFFle: Fingerprinting Filter Rules of Web Application Firewalls, in {6th USENIX Workshop on Offensive Technologies (WOOT 2012)}, 2012.

Pages