Author of the publication

Security During Application Development: an Application Security Expert Perspective.

, , , and . CHI, page 262. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Questions Remain? An Examination of How Developers Understand an Interactive Static Analysis Tool., , , , and . WSIW@SOUPS, USENIX Association, (2016)Interactive Code Annotation for Security Vulnerability Detection., , , and . SIW@CCS, page 17-22. ACM, (2014)Towards Practical Framework for Collecting and Analyzing Network-Centric Attacks., , and . IRI, page 73-78. IEEE Systems, Man, and Cybernetics Society, (2007)Using a Practice Oriented Approach to Teach Web Security Course., , , , and . FECS, page 405-409. CSREA Press, (2009)Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code., , and . SACMAT, page 73-80. ACM, (2016)How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool., , , , and . IEEE Trans. Software Eng., 45 (9): 877-897 (2019)Interactive support for secure programming education., , and . SIGCSE, page 687-692. ACM, (2013)FAIME: An Object-Oriented Methodology for Application Plug-and-Play., , , , , , and . JOOP, 11 (5): 20-26, 34 (1998)Using Unit Testing to Detect Sanitization Flaws., , and . CoRR, (2018)Detecting Cross-Site Scripting Vulnerabilities through Automated Unit Testing., , and . QRS, page 364-373. IEEE, (2017)