Author of the publication

Employing secure coding practices into industrial applications: a case study.

, , , , , , and . Empir. Softw. Eng., 21 (1): 4-16 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intrusion Detection, Measurement Correction, and Attack Localization of PMU Networks., , , , , and . IEEE Trans. Ind. Electron., 69 (5): 4697-4706 (2022)Software engineering issues regarding securing ICS: an industrial case study., , , , , and . MoSEMInA, page 1-6. ACM, (2014)Mining and extraction of personal software process measures through IDE interaction logs., and . MSR, page 78-81. ACM, (2018)Which bugs are missed in code reviews: An empirical study on SmartSHARK dataset., , , and . MSR, page 1-5. ACM, (2022)Extracting Usage Patterns from Power Usage Data of Homes' Appliances in Smart Home using Big Data Platform., and . IoTBD, page 172-178. SciTePress, (2016)A Recursive Classifier System for Partially Observable Environments., , , and . Fundam. Informaticae, 97 (1-2): 15-40 (2009)Knowledge discovery and sequence-based prediction of pandemic influenza using an integrated classification and association rule mining (CBA) algorithm., , and . J. Biomed. Informatics, (2015)A Deep Transfer Learning-Powered EDoS Detection Mechanism for 5G and Beyond Network Slicing., , , and . GLOBECOM, page 4747-4753. IEEE, (2023)On the use of C# Unsafe Code Context: An Empirical Study of Stack Overflow., , , and . ESEM, page 39:1-39:6. ACM, (2020)Obstacles and Misunderstandings Facing Medical Data Mining.. ADMA, volume 4093 of Lecture Notes in Computer Science, page 856-863. Springer, (2006)