List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Which security policies are enforceable by runtime monitors? A survey Computer Science Review | 2014-10-24 | Paper |
| Execution monitoring enforcement under memory-limitation constraints Information and Computation | 2008-04-16 | Paper |
Research outcomes over time
This page was built for person: Nadia Tawbi