From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cybersecurity Discussions in Stack Overflow: A Developer-Centred Analysis of Engagement and Self-Disclosure Behaviour., , , и . CoRR, (2022)Product feasibility verification in software product line., , , и . CLEI, стр. 1-10. IEEE, (2012)ENAGRAM: An App to Evaluate Preventative Nudges for Instagram., , , , и . EuroUSEC, стр. 53-63. ACM, (2022)CATMA: Conformance Analysis Tool For Microservice Applications., , , , , и . ICSE Companion, стр. 59-63. ACM, (2024)What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study., , , , и . MSR, стр. 704-715. ACM, (2024)How Dataflow Diagrams Impact Software Security Analysis: an Empirical Experiment., , , , , и . SANER, стр. 952-963. IEEE, (2024)Rethinking Summarization and Storytelling for Modern Social Multimedia., , , , , , , , , и 5 other автор(ы). MMM (1), том 10704 из Lecture Notes in Computer Science, стр. 632-644. Springer, (2018)GitHub Considered Harmful? Analyzing Open-Source Projects for the Automatic Generation of Cryptographic API Call Sequences., , и . QRS, стр. 896-906. IEEE, (2022)SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices., , , , , и . ARES, стр. 9:1-9:10. ACM, (2022)Conversational DevBots for Secure Programming: An Empirical Study on SKF Chatbot., , , и . EASE, стр. 276-281. ACM, (2022)