Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Responses in Software Development., , , , , and . ACM Trans. Softw. Eng. Methodol., 32 (3): 64:1-64:29 (May 2023)Meet your Maker: A Social Identity Analysis of Robotics Software Engineering., , , , , and . TAS, page 44:1-44:5. ACM, (2023)Talking about security with professional developers., , , , , and . CESSER-IP@ICSE, page 34-40. IEEE / ACM, (2019)An anatomy of security conversations in stack overflow., , , , , and . ICSE-SEIS, page 31-40. ACM, (2019)The Case for Adaptive Security Interventions., , , , , , , , , and 1 other author(s). ACM Trans. Softw. Eng. Methodol., 31 (1): 9:1-9:52 (2022)Security Thinking in Online Freelance Software Development., , , , and . ICSE (SEIS), page 13-24. IEEE, (2023)"Hopefully we are mostly secure": views on secure code in professional practice., , , , , and . CHASE@ICSE, page 61-68. IEEE / ACM, (2019)Accounting for socio-technical resilience in software engineering., , , , , , , and . CHASE, page 31-36. IEEE, (2023)Influences of developers' perspectives on their engagement with security in code., , , , , , , , , and . CHASE@ICSE, page 86-95. IEEE, (2022)Examining active error in software development., , and . VL/HCC, page 152-156. IEEE Computer Society, (2016)