From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Building forensics in: supporting the investigation of digital criminal activities (invited talk).. SERF@ESEC/SIGSOFT FSE, стр. 1. ACM, (2017)Source Code Properties of Defective Infrastructure as Code Scripts., и . CoRR, (2018)Socio-technical developer networks: should we trust our measurements?, и . ICSE, стр. 281-290. ACM, (2011)An empirical model to predict security vulnerabilities using code complexity metrics., и . ESEM, стр. 315-317. ACM, (2008)Evaluating access control of open source electronic health record systems., и . SEHC@ICSE, стр. 63-70. ACM, (2011)Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , и . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)., , , , и . Empir. Softw. Eng., 26 (3): 53 (2021)Experiences in applying agile software development practices in new product development., , , , и . IASTED Conf. on Software Engineering and Applications, стр. 501-506. IASTED/ACTA Press, (2004)Empirical Findings in Agile Methods., , , , , , , , и . XP/Agile Universe, том 2418 из Lecture Notes in Computer Science, стр. 197-207. Springer, (2002)Pair Programming: Experience the Difference., и . XP/Agile Universe, том 2418 из Lecture Notes in Computer Science, стр. 271-272. Springer, (2002)