Fady Copty

According to our database1, Fady Copty authored at least 11 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Integration of an online voting solution with the SMESEC security framework.
Proceedings of the IEEE International Systems Conference, 2020

2018
SMESEC: A Cybersecurity Framework to Protect, Enhance and Educate SMEs.
ERCIM News, 2018

Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device.
CoRR, 2018

Deep Ahead-of-Threat Virtual Patching.
Proceedings of the Information and Operational Technology Security Systems, 2018

Accurate Malware Detection by Extreme Abstraction.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2015
Solutions to IBM POWER8 verification challenges.
IBM J. Res. Dev., 2015

Vacuity in practice: temporal antecedent failure.
Formal Methods Syst. Des., 2015

2010
Formal verification of arbiters using property strengthening and underapproximations.
Proceedings of 10th International Conference on Formal Methods in Computer-Aided Design, 2010

2004
Test sequence generation and model checking using dynamic transition relations.
Int. J. Softw. Tools Technol. Transf., 2004

2003
Efficient debugging in a formal verification environment.
Int. J. Softw. Tools Technol. Transf., 2003

2001
Benefits of Bounded Model Checking at an Industrial Setting.
Proceedings of the Computer Aided Verification, 13th International Conference, 2001


  Loading...