Author of the publication

Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities.

, , and . HASE, page 69-76. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities., , and . APSEC, page 31-40. IEEE, (2020)Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities., , and . HASE, page 69-76. IEEE Computer Society, (2017)Characterizing Software Architecture Changes: An Initial Study., and . ESEM, page 410-419. ACM / IEEE Computer Society, (2007)Human Subject Evaluation of Computer-Security Training Recommender., , , and . COMPSAC, page 251-256. IEEE Computer Society, (2016)A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories., , and . ITNG, page 534-539. IEEE Computer Society, (2015)Managing technical debt: an industrial case study., and . MTD@ICSE, page 8-15. IEEE Computer Society, (2013)High false positive detection of security vulnerabilities: a case study., , and . ACM Southeast Regional Conference, page 359-360. ACM, (2012)The Correspondence Between Software Quality Models and Technical Debt Estimation Approaches., , , , , and . MTD@ICSME, page 19-26. IEEE Computer Society, (2014)Computer Security Training Recommender for Developers., , and . RecSys Posters, volume 1247 of CEUR Workshop Proceedings, CEUR-WS.org, (2014)The Relationship between Traceable Code Patterns and Code Smells., , and . SEKE, page 444-449. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2017)