Author of the publication

Building forensics in: supporting the investigation of digital criminal activities (invited talk).

. SERF@ESEC/SIGSOFT FSE, page 1. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying fault-prone files using static analysis alerts through singular value decomposition., , , and . CASCON, page 276-279. IBM, (2007)Enabling forensics by proposing heuristics to identify mandatory log events., , and . HotSoS, page 6:1-6:11. ACM, (2015)Empirical Evaluation of Agile Processes., , and . XP/Agile Universe, volume 2418 of Lecture Notes in Computer Science, page 286. Springer, (2002)Surveying Security Practice Adherence in Software Development., , and . HotSoS, page 85-94. ACM, (2017)Is complexity really the enemy of software security?, and . QoP, page 47-50. ACM, (2008)Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer., , and . ESSoS, volume 5429 of Lecture Notes in Computer Science, page 122-134. Springer, (2009)Does adding manpower also affect quality?: an empirical, longitudinal analysis., , and . SIGSOFT FSE, page 81-90. ACM, (2011)Toward extraction of security requirements from text: poster., , , , and . HotSoS, page 27:1. ACM, (2018)How bad is it, really? an analysis of severity scores for vulnerabilities: poster., and . HotSoS, page 20:1. ACM, (2018)Guest editorial: Special issue on software reliability engineering.. Empir. Softw. Eng., 15 (4): 321-322 (2010)