Pietro Ferrara , Marco Pistoia , Omer Tripp , Petar I Tsankov
Pietro Ferrara , Marco Pistoia , Omer Tripp , Petar I Tsankov
Yannick Merkli , Pavol Bielik , PETAR TSANKOV , Martin Vechev
Petar Tsankov , Mohammad Torabi Dashti , David A. Basin
Technical report / Systems Group, Department of Computer Science, ETH Zürich 747
Petar Tsankov , Mohammad Torabi Dashti , David Basin
automation of software test 1 -7
Laurent Vanbever , Martin T. Vechev , Petar Tsankov , Ahmed El-Hassany
networked systems design and implementation 579 -594
Laurent Vanbever , Martin Vechev , Petar Tsankov , Vincent Lenders
usenix security symposium 693 -709
Martin Vechev , Petar Tsankov , Arthur Gervais , Andrei Dan
arXiv: Cryptography and Security
Martin T. Vechev , Petar Tsankov , Pavol Bielik , Chengyuan Yao
arXiv: Learning
Rumen Paletov , Petar Tsankov , Veselin Raychev , Martin Vechev
Sigplan Notices
Benjamin Bichsel , Timon Gehr , Dana Drachsler-Cohen , Petar Tsankov
computer and communications security 508 -524
Jingxuan He , Pesho Ivanov , Petar Tsankov , Veselin Raychev
computer and communications security 1667 -1680
Benjamin Bichsel , Veselin Raychev , Petar Tsankov , Martin Vechev
computer and communications security 343 -355
Ahmed El-Hassany , Petar Tsankov , Laurent Vanbever , Martin Vechev
computer aided verification 261 -281
Karl Wüst , Petar Tsankov , Saša Radomirović , Mohammad Torabi Dashti
Digital Investigation 20
Petar Tsankov , Srdjan Marinovic , Mohammad Torabi Dashti , David Basin
principles of security and trust 245 -264
Jingxuan He , Mislav Balunović , Nodar Ambroladze , Petar Tsankov
computer and communications security 531 -548
Marco Guarnieri , Petar Tsankov , Tristan Buchs , Mohammad Torabi Dashti
international symposium on software testing and analysis 203 -214
Petar Tsankov
leveraging applications of formal methods 316 -322
Timon Gehr , Matthew Mirman , Dana Drachsler-Cohen , Petar Tsankov
2018 IEEE Symposium on Security and Privacy (SP) 3 -18