Author of the publication

A large-scale study on the usage of testing patterns that address maintainability attributes: patterns for ease of modification, diagnoses, and comprehension.

, , , , and . MSR, page 391-401. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Empirical Validation of Automated Vulnerability Curation and Characterization., , , , , , and . IEEE Trans. Software Eng., 49 (5): 3241-3260 (2023)Zero-shot Prompting for Code Complexity Prediction Using GitHub Copilot., , , , , and . NLBSE@ICSE, page 56-59. IEEE, (2023)An Automated Approach to Recover the Use-case View of an Architecture., , and . ICSA Companion, page 63-66. IEEE, (2020)A search engine for finding and reusing architecturally significant code., , , and . J. Syst. Softw., (2017)Generate and Pray: Using SALLMS to Evaluate the Security of LLM Generated Code., and . CoRR, (2023)An empirical study of tactical vulnerabilities., , , , and . J. Syst. Softw., (2019)Salsa: static analysis of serialization features., , and . FTfJP@ECOOP, page 18-25. ACM, (2020)Achilles' heel of plug-and-Play software architectures: a grounded theory based approach., , , , and . ESEC/SIGSOFT FSE, page 671-682. ACM, (2019)Towards Automated Evidence Generation for Rapid and Continuous Software Certification., , and . ISSRE Workshops, page 287-294. IEEE, (2020)Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird., , , , , and . ICSA, page 69-78. IEEE Computer Society, (2017)