From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Guidelines for Systematic Mapping Studies in Security Engineering., и . CoRR, (2018)Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , и . REFSQ, том 10153 из Lecture Notes in Computer Science, стр. 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , и . REFSQ, том 10153 из Lecture Notes in Computer Science, стр. 370-377. Springer, (2017)Enabling Citizen Roboticists., , и . Enabling Intelligence through Middleware, том WS-10-09 из AAAI Technical Report, AAAI, (2010)Educating Students to be Better Citizens of Tech Communities., и . SIGCSE (2), стр. 1053. ACM, (2022)Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., и . SERE (Companion), стр. 229-230. IEEE, (2013)Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements., , и . Software Engineering Research and Practice, стр. 966-971. CSREA Press, (2006)Step One Towards Science of Security., , и . SafeConfig@CCS, стр. 31-35. ACM, (2017)Automating Systematic Literature Review., и . Contemporary Empirical Methods in Software Engineering, Springer, (2020)Understanding the impressions, motivations, and barriers of one time code contributors to FLOSS projects: a survey., , и . ICSE, стр. 187-197. IEEE / ACM, (2017)