Author of the publication

From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security.

, , and . USENIX Security Symposium, page 289-305. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Has Artifact Evaluation Ever Done for Us?. IEEE Secur. Priv., 20 (5): 96-99 (2022)Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite (Short Summary)., , , , and . Software Engineering, volume P-320 of LNI, page 21-23. Gesellschaft für Informatik e.V., (2022)Hidden Truths in Dead Software Paths., , , and . Software Engineering, volume P-252 of LNI, page 63-64. GI, (2016)Lossless, Persisted Summarization of Static Callgraph, Points-To and Data-Flow Analysis., , and . ECOOP, volume 194 of LIPIcs, page 2:1-2:31. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Crowdsourcing the State of the Art(ifacts)., , , , and . CoRR, (2021)Can an online service predict gender?: on the state-of-the-art in gender identification from texts., and . GE@ICSE, page 13-16. IEEE / ACM, (2019)Persisting and Reusing Results of Static Program Analyses on a Large Scale., and . Software Engineering, volume P-343 of LNI, page 155-156. Gesellschaft für Informatik e.V., (2024)(Re)Use of Research Results (Is Rampant)., , , , and . Commun. ACM, 66 (2): 75-81 (February 2023)Persisting and Reusing Results of Static Program Analyses on a Large Scale., and . ASE, page 888-900. IEEE, (2023)DGMF: Fast Generation of Comparable, Updatable Dependency Graphs for Software Repositories., , and . MSR, page 115-119. IEEE, (2023)