Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities., , and . ICSA, page 31-40. IEEE, (2019)How could ULS systems achieve architecture benefits?, , and . ULSSIS@ICSE, page 41-44. ACM, (2008)Roles and impacts of hands-on software architects in five industrial case studies., , , , and . ICSE, page 117-127. ACM, (2018)TestEX: A Search Tool for Finding and Retrieving Example Unit Tests from Open Source Projects., , and . ISSRE Workshops, page 153-159. IEEE Computer Society, (2016)An Automated Approach to Recover the Use-case View of an Architecture., , and . ICSA Companion, page 63-66. IEEE, (2020)Predicting the severity and exploitability of vulnerability reports using convolutional neural nets., and . EnCyCriS@ICSE, page 1-8. ACM, (2022)Automatic classification of software artifacts in open-source applications., , , , , and . MSR, page 414-425. ACM, (2018)DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests., , , , , , , and . ASE, page 287-298. IEEE, (2020)A Grounded Theory Based Approach to Characterize Software Attack Surfaces., , and . ICSE, page 13-24. ACM, (2022)Constructing a Shared Infrastructure for Software Architecture Analysis and Maintenance., , , , , , , , , and 1 other author(s). ICSA, page 150-161. IEEE, (2021)