Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guidelines for Systematic Mapping Studies in Security Engineering., and . CoRR, (2018)A systematic literature review to identify and classify software requirement errors., and . Inf. Softw. Technol., 51 (7): 1087-1109 (2009)Characterizing software architecture changes: A systematic review., and . Inf. Softw. Technol., 52 (1): 31-51 (2010)Claims about the use of software engineering practices in science: A systematic literature review., and . Inf. Softw. Technol., (2015)Collegeville Workshop 2021: Scientific Software Teams., , and . Comput. Sci. Eng., 24 (3): 4-5 (2022)How do Practitioners Perceive the Relevance of Requirements Engineering Research?, , , , , , , , and . IEEE Trans. Software Eng., 48 (6): 1947-1964 (2022)Can observational techniques help novices overcome the software inspection learning curve? An empirical investigation., , and . Empirical Software Engineering, 11 (4): 523-539 (2006)Step One Towards Science of Security., , and . SafeConfig@CCS, page 31-35. ACM, (2017)Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements., , and . Software Engineering Research and Practice, page 966-971. CSREA Press, (2006)Replications of software engineering experiments., , , and . Empirical Software Engineering, 19 (2): 267-276 (2014)