Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Automated Detection of Malicious npm Packages., and . ICSE, page 1681-1692. ACM, (2022)Identifying casualty changes in software patches., , and . ESEC/SIGSOFT FSE, page 304-315. ACM, (2021)Strategies for Pattern-Based Detection of Architecturally-Relevant Software Vulnerabilities., and . ICSA, page 92-102. IEEE, (2020)Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms., , , , , and . CoRR, (2020)Assessing the Feasibility of Web-Request Prediction Models on Mobile Platforms., , , , , and . MOBILESoft@ICSE, page 12-23. IEEE, (2021)FrUITeR: a framework for evaluating UI test reuse., , , , , , , and . ESEC/SIGSOFT FSE, page 1190-1201. ACM, (2020)Achilles' heel of plug-and-Play software architectures: a grounded theory based approach., , , , and . ESEC/SIGSOFT FSE, page 671-682. ACM, (2019)A pilot study on architecture and vulnerabilities: lessons learned.. ECASE@ICSE, page 42-47. IEEE / ACM, (2019)Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird., , , , , and . ICSA, page 69-78. IEEE Computer Society, (2017)Toward Improved Deep Learning-based Vulnerability Detection., , , and . ICSE, page 62:1-62:12. ACM, (2024)