Author of the publication

An architecture for security-oriented perfective maintenance of legacy software.

, , , and . Inf. Softw. Technol., 45 (9): 619-631 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive study on software aging across android versions and vendors., , , and . Empir. Softw. Eng., 25 (5): 3357-3395 (2020)Who Evaluates the Evaluators? On Automatic Metrics for Assessing AI-based Offensive Code Generators., , , , and . CoRR, (2022)Virtualizing Mixed-Criticality Systems: A Survey on Industrial Trends and Issues., , , and . CoRR, (2021)Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study., , , and . CoRR, (2022)Towards Cognitive Security Defense from Data., , and . DSN (Supplements), page 11-12. IEEE, (2019)Run-time failure detection via non-intrusive event analysis in a large-scale cloud computing platform., , , and . J. Syst. Softw., (April 2023)Software micro-rejuvenation for Android mobile systems., , , , and . J. Syst. Softw., (2022)Automating the Correctness Assessment of AI-generated Code for Security Contexts., , , , and . CoRR, (2023)Virtualizing mixed-criticality systems: A survey on industrial trends and issues., , , and . Future Gener. Comput. Syst., (2022)Building a dependable system from a legacy application with CORBA., , , and . J. Syst. Archit., 48 (1-3): 81-98 (2002)