Author of the publication

Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation.

, and . SERE (Companion), page 229-230. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying the Challenges of the Blockchain Community from StackExchange Topics and Trends., , , and . COMPSAC (1), page 123-128. IEEE, (2019)Diversity and Inclusion in Open Source Software (OSS) Projects: Where Do We Stand?, and . ESEM, page 1-11. IEEE, (2019)What Makes a Code Review Useful to OpenDev Developers? An Empirical Investigation., and . CoRR, (2023)Identifying the characteristics of vulnerable code changes: an empirical study., , , , and . SIGSOFT FSE, page 257-268. ACM, (2014)Why Security Defects Go Unnoticed during Code Reviews? A Case-Control Study of the Chromium OS Project., , and . ICSE, page 1373-1385. IEEE, (2021)Understanding the Motivations, Challenges and Needs of Blockchain Software Developers: A Survey., , , and . CoRR, (2018)Identifying the Prevalence of Gender Biases among the Computing Organizations., , and . CoRR, (2021)Mining repositories to reveal the community structures of open source software projects.. ACM Southeast Regional Conference, page 397-398. ACM, (2012)A Rubric to Identify Misogynistic and Sexist Texts from Software Developer Communications., , and . ESEM, page 27:1-27:6. ACM, (2021)SOQDE: A Supervised Learning Based Question Difficulty Estimation Model for Stack Overflow., , , , , and . APSEC, page 445-454. IEEE, (2018)