Author of the publication

How to Improve the Security Skills of Mobile App Developers? Comparing and Contrasting Expert Views.

, , and . WSIW@SOUPS, USENIX Association, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EA-tracer: identifying traceability links between code aspects and early aspects., , , and . SAC, page 1035-1042. ACM, (2012)JAT: A Test Automation Framework for Multi-Agent Systems., , , , , and . ICSM, page 425-434. IEEE Computer Society, (2007)On to Aspect Persistence.. GCSE, volume 2177 of Lecture Notes in Computer Science, page 26-36. Springer, (2000)Towards the practical mutation testing of AspectJ programs., , and . Sci. Comput. Program., 78 (9): 1639-1662 (2013)It Bends But Would It Break? Topological Analysis of BGP Infrastructures in Europe., , , , , , and . EuroS&P, page 423-438. IEEE, (2016)A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks., , and . APF, volume 8319 of Lecture Notes in Computer Science, page 187-202. Springer, (2012)Systematic Change Impact Determination in Complex Object Database Schemata., , , and . ECOOP Workshop for PhD Students in OO Systems, page 31-40. (1999)The Shadow Warriors: In the no man's land between industrial control systems and enterprise IT systems., , , , and . SOUPS, USENIX Association, (2017)Discovering Early Aspects., , , , , and . IEEE Software, 23 (1): 61-70 (2006)Data exfiltration: A review of external attack vectors and countermeasures., , , , , and . J. Netw. Comput. Appl., (2018)