Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study., , , and . ACM Trans. Softw. Eng. Methodol., 32 (4): 99:1-99:36 (July 2023)As Code Testing: Characterizing Test Quality in Open Source Ansible Development., and . ICST, page 208-219. IEEE, (2022)Characterizing the influence of continuous integration: empirical results from 250+ open source and proprietary projects., , , and . SWAN@ESEC/SIGSOFT FSE, page 8-14. ACM, (2018)Investigating Novel Approaches to Defend Software Supply Chain Attacks., , , , , and . ISSRE Workshops, page 283-288. IEEE, (2022)Quantum Machine Learning for Software Supply Chain Attacks: How Far Can We Go?, , , , , , , , , and 1 other author(s). COMPSAC, page 530-538. IEEE, (2022)Shhh!: 12 Practices for Secret Management in Infrastructure as Code., , and . SecDev, page 56-62. IEEE, (2021)Practitioner Perceptions of Ansible Test Smells., , and . ICSA-C, page 1-3. IEEE, (2023)What is the connection between issues, bugs, and enhancements?: lessons learned from 800+ software projects., , , , and . ICSE (SEIP), page 306-315. ACM, (2018)Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection., , , , , , , , and . COMPSAC, page 1057-1063. IEEE, (2023)Mitigating Insecure Outputs in Large Language Models(LLMs): A Practical Educational Module., , , , , , , and . COMPSAC, page 2424-2429. IEEE, (2024)