Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A PRISMA-driven systematic mapping study on system assurance weakeners., , , , and . CoRR, (2023)A Survey on Automated Software Vulnerability Detection Using Machine Learning and Deep Learning., , , , , and . CoRR, (2023)Bolstering the Persistence of Black Students in Undergraduate Computer Science Programs: A Systematic Mapping Study., , , , , and . ACM Trans. Comput. Educ., 23 (4): 40:1-40:42 (December 2023)Position Paper: A Vision for the Dynamic Safety Assurance of ML-Enabled Autonomous Driving Systems., , and . REW, page 297-301. IEEE, (2023)Improving formal analysis of state machines with particular emphasis on and-cross transitions., , , , and . Comput. Lang. Syst. Struct., (2018)The Layered Architecture revisited: Is it an Optimization Problem?, , , and . SEKE, page 344-349. Knowledge Systems Institute Graduate School, (2013)GPT-4 and Safety Case Generation: An Exploratory Analysis., , , and . CoRR, (2023)Combining lexical and structural information to reconstruct software layers., , and . Inf. Softw. Technol., (2016)A checklist-based approach to assess the systematicity of the abstracts of reviews self-identifying as systematic reviews., and . APSEC, page 502-506. IEEE, (2022)Design and implementation of distributed expert systems: On a control strategy to manage the execution flow of rule activation., , , and . Expert Syst. Appl., (2018)