Cited By
View all- Tsingenopoulos ICortellazzi JBošanský BAonzo SPreuveneers DJoosen WPierazzi FCavallaro L(2024)How to Train your Antivirus: RL-based Hardening through the Problem SpaceProceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3678890.3678912(130-146)Online publication date: 30-Sep-2024
- Hora ASpinellis DConstantinou EBacchelli A(2024)TestDossier: A Dataset of Tested Values Automatically Extracted from Test ExecutionProceedings of the 21st International Conference on Mining Software Repositories10.1145/3643991.3644875(299-303)Online publication date: 15-Apr-2024
- Hora ARoychoudhury APaiva AAbreu RStorey M(2024)SpotFlow: Tracking Method Calls and States at RuntimeProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings10.1145/3639478.3640029(35-39)Online publication date: 14-Apr-2024
- Show More Cited By