Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enabling forensics by proposing heuristics to identify mandatory log events., , and . HotSoS, page 6:1-6:11. ACM, (2015)Identifying fault-prone files using static analysis alerts through singular value decomposition., , , and . CASCON, page 276-279. IBM, (2007)Surveying Security Practice Adherence in Software Development., , and . HotSoS, page 85-94. ACM, (2017)Empirical Evaluation of Agile Processes., , and . XP/Agile Universe, volume 2418 of Lecture Notes in Computer Science, page 286. Springer, (2002)Exploring the Shift in Security Responsibility., , and . IEEE Secur. Priv., 20 (6): 8-17 (2022)Is complexity really the enemy of software security?, and . QoP, page 47-50. ACM, (2008)Does adding manpower also affect quality?: an empirical, longitudinal analysis., , and . SIGSOFT FSE, page 81-90. ACM, (2011)Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer., , and . ESSoS, volume 5429 of Lecture Notes in Computer Science, page 122-134. Springer, (2009)Toward extraction of security requirements from text: poster., , , , and . HotSoS, page 27:1. ACM, (2018)How bad is it, really? an analysis of severity scores for vulnerabilities: poster., and . HotSoS, page 20:1. ACM, (2018)