Author of the publication

AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts.

, , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experiences in applying agile software development practices in new product development., , , , and . IASTED Conf. on Software Engineering and Applications, page 501-506. IASTED/ACTA Press, (2004)Strengthening the Case for Pair Programming., , , and . IEEE Software, 17 (4): 19-25 (2000)Towards improved security criteria for certification of electronic health record systems., , and . SEHC@ICSE, page 68-73. ACM, (2010)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment., , , and . Empir. Softw. Eng., 22 (5): 2684-2717 (2017)Omni: automated ensemble with unexpected models against adversarial evasion attack., , , and . Empir. Softw. Eng., 27 (1): 26 (2022)Software development with feature toggles: practices used by practitioners., , and . Empir. Softw. Eng., 26 (1): 1 (2021)How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)., , , , and . Empir. Softw. Eng., 26 (3): 53 (2021)Can traditional fault prediction models be used for vulnerability prediction?, and . Empir. Softw. Eng., 18 (1): 25-59 (2013)Software Engineering for Internet Applications.. The Practical Handbook of Internet Computing, Chapman and Hall/CRC, (2004)