Author of the publication

Automated software architecture security risk analysis using formalized signatures.

, , and . ICSE, page 662-671. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SplashKit: A Development Framework for Motivating and Engaging Students in Introductory Programming., , , , and . TALE, page 40-47. IEEE, (2018)SecDSVL: A Domain-Specific Visual Language to Support Enterprise Security Modelling., and . Australian Software Engineering Conference, page 152-161. IEEE Computer Society, (2014)Conclusions., , , , and . Relating Software Requirements and Architectures, Springer, (2011)Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors., , and . ICECCS, page 70-79. IEEE Computer Society, (2015)A Visual Language and Environment for Specifying User Interface Event Handling in Design Tools., , and . AUIC, volume 64 of CRPIT, page 87-94. Australian Computer Society, (2007)DefectChecker: Automated Smart Contract Defect Detection by Analyzing EVM Bytecode., , , , , and . IEEE Trans. Software Eng., 48 (7): 2189-2207 (2022)Context-aware Retrieval-based Deep Commit Message Generation., , , , , and . ACM Trans. Softw. Eng. Methodol., 30 (4): 56:1-56:30 (2021)mHealthSwarm: A Unified Platform for mHealth Applications., , , , , and . ENASE, page 605-612. SCITEPRESS, (2023)Evaluation of an Augmented Reality Approach to Better Understanding Diverse End User Website Usage Challenges., , and . ENASE, page 50-61. SCITEPRESS, (2022)Reporting Usability Defects: Limitations of Open Source Defect Repositories and Suggestions for Improvement., , and . ASWEC (2), page 38-43. ACM, (2015)