Author of the publication

Revisiting the VCCFinder approach for the identification of vulnerability-contributing commits.

, , , , , and . Empir. Softw. Eng., 26 (3): 46 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Domain Analysis to Specify Design Defects and Generate Detection Algorithms., , , and . FASE, volume 4961 of Lecture Notes in Computer Science, page 276-291. Springer, (2008)Specification and Detection of SOA Antipatterns in Web Services., , , and . ECSA, volume 8627 of Lecture Notes in Computer Science, page 58-73. Springer, (2014)SSPCatcher: Learning to catch security patches., , , , , , and . Empir. Softw. Eng., 27 (6): 151 (2022)Are REST APIs for Cloud Computing Well-Designed? An Exploratory Study., , , and . ICSOC, volume 9936 of Lecture Notes in Computer Science, page 157-170. Springer, (2016)Static Code Analysis of Multilanguage Software Systems., , , , , , , and . CoRR, (2019)An exploratory study of MVC-based architectural patterns in Android apps., , , and . SAC, page 1711-1720. ACM, (2019)Towards a REST Cloud Computing Lexicon., , , and . CLOSER, page 348-355. SciTePress, (2017)Reusable model transformations., , , , , and . Softw. Syst. Model., 11 (1): 111-125 (2012)DynAMICS: A Tool-Based Method for the Specification and Dynamic Detection of Android Behavioral Code Smells., , , and . IEEE Trans. Software Eng., 50 (4): 765-784 (April 2024)Codifying Hidden Dependencies in Legacy J2EE Applications., , , , , , , , and . APSEC, page 305-314. IEEE, (2018)