Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors., , and . ICECCS, page 70-79. IEEE Computer Society, (2015)TeeVML: tool support for semi-automatic integration testing environment emulation., , , and . ASE, page 840-845. ACM, (2016)Gravity++: A graph-based framework for constructing interactive visualization narratives., , , , , , and . J. Comput. Lang., (2022)CORG: A Component-Oriented Synthetic Textual Requirements Generator., , , , and . REFSQ, volume 12685 of Lecture Notes in Computer Science, page 54-70. Springer, (2021)COVID-19 vs Social Media Apps: Does Privacy Really Matter?, , , and . ICSE-SEIS, page 48-57. IEEE, (2021)Reinforcement learning-based autonomous attacker to uncover computer network vulnerabilities., , , and . Neural Comput. Appl., 36 (23): 14341-14360 (August 2024)Requirements Practices and Gaps When Engineering Human-Centered Artificial Intelligence Systems., , , , and . CoRR, (2023)Requirements Formality Levels Analysis and Transformation of Formal Notations into Semi-formal and Informal Notations (S)., , , , and . SEKE, page 303-308. KSI Research Inc., (2021)Adopting industry agile practices in large-scale capstone education., , , , , and . ICSE (SEET), page 119-129. ACM, (2020)Score-Based Automatic Detection and Resolution of Syntactic Ambiguity in Natural Language Requirements., , , , and . ICSME, page 651-661. IEEE, (2020)