Author of the publication

Towards the practical mutation testing of AspectJ programs.

, , and . Sci. Comput. Program., 78 (9): 1639-1662 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe., , , , , , and . EuroS&P, page 423-438. IEEE, (2016)A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks., , and . APF, volume 8319 of Lecture Notes in Computer Science, page 187-202. Springer, (2012)μ-DSU: A Micro-Language Based Approach to Dynamic Software Updating., , , and . Comput. Lang. Syst. Struct., (2018)Scoping the Cyber Security Body of Knowledge., , , , , , and . IEEE Secur. Priv., 16 (3): 96-102 (2018)Interventions for long-term software security: Creating a lightweight program of assurance techniques for developers., , , , , and . Softw. Pract. Exp., 50 (3): 275-298 (2020)On to Aspect Persistence.. GCSE, volume 2177 of Lecture Notes in Computer Science, page 26-36. Springer, (2000)The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems., , , , and . SOUPS, USENIX Association, (2017)Evaluation for Evolution: How Well Commercial Systems Do., and . ECOOP Workshops, volume 1743 of Lecture Notes in Computer Science, page 210-211. Springer, (1999)Safe cryptography for all: towards visual metaphor driven cryptography building blocks., , , and . SEAD@ICSE, page 41-44. ACM, (2018)Assessing the Impact of Aspects on Exception Flows: An Exploratory Study., , , , , , , and . ECOOP, volume 5142 of Lecture Notes in Computer Science, page 207-234. Springer, (2008)