From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Architectural Security Weaknesses in Industrial Control Systems (ICS) an Empirical Study Based on Disclosed Software Vulnerabilities., , и . ICSA, стр. 31-40. IEEE, (2019)How could ULS systems achieve architecture benefits?, , и . ULSSIS@ICSE, стр. 41-44. ACM, (2008)Roles and impacts of hands-on software architects in five industrial case studies., , , , и . ICSE, стр. 117-127. ACM, (2018)TestEX: A Search Tool for Finding and Retrieving Example Unit Tests from Open Source Projects., , и . ISSRE Workshops, стр. 153-159. IEEE Computer Society, (2016)An Automated Approach to Recover the Use-case View of an Architecture., , и . ICSA Companion, стр. 63-66. IEEE, (2020)Predicting the severity and exploitability of vulnerability reports using convolutional neural nets., и . EnCyCriS@ICSE, стр. 1-8. ACM, (2022)Automatic classification of software artifacts in open-source applications., , , , , и . MSR, стр. 414-425. ACM, (2018)DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests., , , , , , , и . ASE, стр. 287-298. IEEE, (2020)A Grounded Theory Based Approach to Characterize Software Attack Surfaces., , и . ICSE, стр. 13-24. ACM, (2022)Constructing a Shared Infrastructure for Software Architecture Analysis and Maintenance., , , , , , , , , и 1 other автор(ы). ICSA, стр. 150-161. IEEE, (2021)