Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Security Twin Peaks., , , , and . ESSoS, volume 6542 of Lecture Notes in Computer Science, page 167-180. Springer, (2011)APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities., , , , and . Empir. Softw. Eng., 29 (1): 18 (February 2024)The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models., , and . IEEE Trans. Reliab., 66 (1): 17-37 (2017)On the secure software development process: CLASP, SDL and Touchpoints compared., , , , and . Inf. Softw. Technol., 51 (7): 1152-1171 (2009)GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences., , and . QRS, page 896-906. IEEE, (2022)Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities., , , , and . ISSTA, page 789-792. ACM, (2022)Precise Analysis of Purpose Limitation in Data Flow Diagrams., , , , and . ARES, page 17:1-17:11. ACM, (2022)SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices., , , , , and . ARES, page 9:1-9:10. ACM, (2022)Asset-driven Security Assurance Cases with Built-in Quality Assurance., , , , and . EnCyCriS@ICSE, page 29-36. IEEE, (2021)Vul4J: A Dataset of Reproducible Java Vulnerabilities Geared Towards the Study of Program Repair Techniques., , and . MSR, page 464-468. ACM, (2022)