Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study., , , , and . MSR, page 704-715. ACM, (2024)Exploring the problems, their causes and solutions of AI pair programming: A study on GitHub and Stack Overflow., , , , , , and . J. Syst. Softw., (2025)An empirical study of security practices for microservices systems., , , , , and . J. Syst. Softw., (April 2023)A Comprehensive Study of Disaster Support Mobile Apps., , , and . CoRR, (2024)Architecture Decisions in AI-based Systems Development: An Empirical Study., , , , , and . SANER, page 616-626. IEEE, (2023)Security Support in Continuous Deployment Pipeline., , , , and . ENASE, page 57-68. SciTePress, (2017)Architectural Design Space for Modelling and Simulation as a Service: A Review., , and . J. Syst. Softw., (2020)The Impact of a STEM-based Entrepreneurship Program on the Entrepreneurial Intention of Secondary School Female Students., , , and . CoRR, (2020)Security Defect Detection via Code Review: A Study of the OpenStack and Qt Communities., , , , and . ESEM, page 1-12. IEEE, (2023)Towards an Understanding of Developers' Perceptions of Transparency in Software Development: A Preliminary Study., , , , and . ASEW, page 40-45. IEEE, (2023)