From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proposing Regulatory-Driven Automated Test Suites., , , и . AGILE, стр. 11-21. IEEE Computer Society, (2013)Challenges with applying vulnerability prediction models., , , и . HotSoS, стр. 4:1-4:9. ACM, (2015)Building a security practices evaluation framework.. HotSoS, стр. 23:1-23:2. ACM, (2015)Vulnerability discovery strategies used in software projects., , и . ASE Workshops, стр. 13-18. ACM, (2020)Evolving FinTech 512 'Software Engineering For Financial Technology'., и . SEENG, стр. 17-24. IEEE, (2023)Securing the Broker Pattern., и . EuroPLoP, стр. 513-530. UVK - Universitaetsverlag Konstanz, (2006)What questions do programmers ask about configuration as code?, , , и . RCoSE@ICSE, стр. 16-22. ACM, (2018)A Security Practices Evaluation Framework.. ICSE (2), стр. 935-938. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Approximating Attack Surfaces with Stack Traces., , , , и . ICSE (2), стр. 199-208. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Surveying Security Practice Adherence in Software Development., , и . HotSoS, стр. 85-94. ACM, (2017)