An overview of JML tools and applications L Burdy, Y Cheon, DR Cok, MD Ernst, JR Kiniry, GT Leavens, KRM Leino, ... International journal on software tools for technology transfer 7, 212-232, 2005 | 890 | 2005 |
Beyond assertions: Advanced specification and verification with JML and ESC/Java2 P Chalin, JR Kiniry, GT Leavens, E Poll Formal Methods for Components and Objects: 4th International Symposium, FMCO …, 2006 | 350 | 2006 |
An overview of JML tools and applications L Burdy, Y Cheon, D Cok, MD Ernst, J Kiniry, GT Leavens, K Rustan, ... Electronic Notes in Theoretical Computer Science 80, 75-91, 2003 | 350 | 2003 |
Protocol State Fuzzing of TLS Implementations J De Ruiter, E Poll 24th {USENIX} Security Symposium ({USENIX} Security 15), 193-206, 2015 | 331 | 2015 |
JML: notations and tools supporting detailed design in Java GT Leavens, C Ruby, KRM Leino, E Poll, B Jacobs Addendum to the 2000 proceedings of the conference on Object-oriented …, 2000 | 250 | 2000 |
EMV in a nutshell J van den Breekel, DA Ortiz-Yepes, E Poll, J de Ruiter Technical Report, 2016 [retrieved on Mar. 25, 2019]. Retrieved from Internet …, 2016 | 177 | 2016 |
JML reference manual GT Leavens, E Poll, C Clifton, Y Cheon, C Ruby, D Cok, P Müller, J Kiniry, ... | 172 | 2008 |
SmartCards and RFID L Batina, E Poll Course PowerPoint Presentation for IPA Security Course, Digital Security at …, 2019 | 143 | 2019 |
Adversarial examples on object recognition: A comprehensive survey A Serban, E Poll, J Visser ACM Computing Surveys (CSUR) 53 (3), 1-38, 2020 | 141 | 2020 |
A logic for the Java Modeling Language JML B Jacobs, E Poll International Conference on Fundamental Approaches to Software Engineering …, 2001 | 137 | 2001 |
What blockchain alternative do you need? T Koens, E Poll Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2018 | 125 | 2018 |
Formal models of bank cards for free F Aarts, J De Ruiter, E Poll 2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013 | 125 | 2013 |
Java program verification at Nijmegen: Developments and perspective B Jacobs, E Poll International Symposium on Software Security, 134-153, 2003 | 125 | 2003 |
Assessing interoperability solutions for distributed ledgers T Koens, E Poll Pervasive and Mobile Computing 59, 101079, 2019 | 114 | 2019 |
Malicious code on Java Card smartcards: Attacks and countermeasures W Mostowski, E Poll International Conference on Smart Card Research and Advanced Applications, 1-16, 2008 | 109 | 2008 |
Model learning and model checking of SSH implementations P Fiterău-Broştean, T Lenaerts, E Poll, J de Ruiter, F Vaandrager, ... Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model …, 2017 | 102 | 2017 |
Pure type systems with definitions P Severi, E Poll Logical Foundations of Computer Science: Third International Symposium, LFCS …, 1994 | 102* | 1994 |
Smart metering in the Netherlands: What, how, and why P Van Aubel, E Poll International Journal of Electrical Power & Energy Systems 109, 719-725, 2019 | 101 | 2019 |
Analysis of secure key storage solutions on Android T Cooijmans, J de Ruiter, E Poll Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014 | 95 | 2014 |
A standard driven software architecture for fully autonomous vehicles AC Serban, E Poll, J Visser 2018 IEEE International Conference on Software Architecture Companion (ICSA …, 2018 | 88 | 2018 |