Author of the publication

A visual analytic framework for exploring relationships in textual contents of digital forensics evidence.

, , , , , and . VizSEC, page 39-44. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Third international workshop on software engineering for computational science and engineering.. ICCS, volume 1 of Procedia Computer Science, page 1485-1486. Elsevier, (2010)Replications of software engineering experiments., , , and . Empirical Software Engineering, 19 (2): 267-276 (2014)Guidelines for Systematic Mapping Studies in Security Engineering., and . CoRR, (2018)Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 370-377. Springer, (2017)Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., and . SERE (Companion), page 229-230. IEEE, (2013)A systematic literature review to identify and classify software requirement errors., and . Inf. Softw. Technol., 51 (7): 1087-1109 (2009)Characterizing software architecture changes: A systematic review., and . Inf. Softw. Technol., 52 (1): 31-51 (2010)Claims about the use of software engineering practices in science: A systematic literature review., and . Inf. Softw. Technol., (2015)Can observational techniques help novices overcome the software inspection learning curve? An empirical investigation., , and . Empirical Software Engineering, 11 (4): 523-539 (2006)