![]() Music |
![]() Video |
![]() Movies |
![]() Chart |
![]() Show |
![]() |
ARBITRAR : User-Guided API Misuse Detection (IEEE Symposium on Security and Privacy) View |
![]() |
ARBITRAR User Guided API Misuse Detection (All Hacking Cons) View |
![]() |
ICSE 2022 J1: Active Learning of Discriminative Subgraph Patterns for API Misuse Detection (Hong Jin ICSE) View |
![]() |
Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Examples and Patches (ICSE) View |
![]() |
CRYLOGGER: Detecting Crypto Misuses Dynamically (IEEE Symposium on Security and Privacy) View |
![]() |
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel... (IEEE Symposium on Security and Privacy) View |
![]() |
A First Look at Zoombombing (IEEE Symposium on Security and Privacy) View |
![]() |
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password ... (IEEE Symposium on Security and Privacy) View |
![]() |
() View |
![]() |
() View |