Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges with applying vulnerability prediction models., , , and . HotSoS, page 4:1-4:9. ACM, (2015)Proposing Regulatory-Driven Automated Test Suites., , , and . AGILE, page 11-21. IEEE Computer Society, (2013)Building a security practices evaluation framework.. HotSoS, page 23:1-23:2. ACM, (2015)Securing the Broker Pattern., and . EuroPLoP, page 513-530. UVK - Universitaetsverlag Konstanz, (2006)ICSE 2015 SIGSOFT CAPS Report.. ACM SIGSOFT Softw. Eng. Notes, 40 (4): 33-34 (2015)An improved text classification modelling approach to identify security messages in heterogeneous projects., and . Softw. Qual. J., 29 (2): 509-553 (2021)Evolving FinTech 512 'Software Engineering For Financial Technology'., and . SEENG, page 17-24. IEEE, (2023)Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of Kubernetes., , , and . CoRR, (2022)A Security Practices Evaluation Framework.. ICSE (2), page 935-938. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Approximating Attack Surfaces with Stack Traces., , , , and . ICSE (2), page 199-208. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).