From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A reverse engineering process for design level document production from ADA code., , и . Inf. Softw. Technol., 35 (1): 23-34 (1993)An HMM and structural entropy based detector for Android malware: An empirical study., , и . Comput. Secur., (2016)A family of experiments to validate metrics for software process models., , , , и . J. Syst. Softw., 77 (2): 113-129 (2005)Managing Trust in Social Networks., и . Inf. Secur. J. A Glob. Perspect., 21 (4): 206-215 (2012)Maintaining traceability links during object-oriented software evolution., , , и . Softw. Pract. Exp., 31 (4): 331-355 (2001)GasMet: Profiling Gas Leaks in the Deployment of Solidity Smart Contracts., , , , и . CoRR, (2020)The Evolution of Project Inter-Dependencies in a Software Ecosystem: the Case of Apache, , , , и . Proceedings of the 2013 IEEE International Conference on Software Maintenance, стр. 280--289. (сентября 2013)Prolog for Software Maintenance., , и . SEKE, стр. 478-486. Knowledge Systems Institute, (1995)s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables., , и . SECRYPT, стр. 462-467. SciTePress, (2017)Supporting change request assignment in open source development., и . SAC, стр. 1767-1772. ACM, (2006)