Author of the publication

Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies.

, , , , , and . CLEI Electron. J., 19 (3): 5 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What software reuse benefits have been transferred to the industry? A systematic mapping study., , , and . Inf. Softw. Technol., (2018)Trends in software reuse research: A tertiary study., , and . Comput. Stand. Interfaces, (2019)Systematic Mapping Protocol: Have Systematic Reuse Benefits Been Transferred to Real-world Settings?, , , , and . CoRR, (2016)Factors Affecting Distributed Agile Projects: a Systematic Review., , and . Int. J. Softw. Eng. Knowl. Eng., 23 (9): 1289-1302 (2013)A Review of the Legal, Regulatory and Practical Aspects Needed to Unlock Autonomous Beyond Visual Line of Sight Unmanned Aircraft Systems Operations., , , and . J. Intell. Robotic Syst., 106 (1): 10 (2022)Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies., , , , , and . CLEI Electron. J., 19 (3): 5 (2016)Introduction to the special issue on engineering context-aware software systems., , and . Inf. Softw. Technol., (2021)Definiciones y Tendencia de Deuda Técnica: Un Mapeo Sistemático de la Literatura., and . CIbSE, page 29-42. Curran Associates, (2013)Characterizing testing methods for context-aware software systems: Results from a quasi-systematic literature review., , and . J. Syst. Softw., (2017)CATS Design: A Context-Aware Test Suite Design Process., , and . SAST, page 9:1-9:10. ACM, (2016)