From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Identifying Mobile Repackaged Applications through Formal Methods., , , , и . ICISSP, стр. 673-682. SciTePress, (2017)Exploring Mobile User Experience Through Code Quality Metrics., , , и . PROFES, том 10027 из Lecture Notes in Computer Science, стр. 705-712. (2016)A family of experiments to validate metrics for software process models., , , , и . J. Syst. Softw., 77 (2): 113-129 (2005)Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection., , , и . IWSPA@CODASPY, стр. 50-57. ACM, (2016)Ransomware Steals Your Phone. Formal Methods Rescue It., , , и . FORTE, том 9688 из Lecture Notes in Computer Science, стр. 212-221. Springer, (2016)Investigando los beneficios de Pair Designing: un estudio empírico con profesionales., , , и . JISBD, стр. 489-494. (2006)Introducing Quality System in Small and Medium Enterprises: An Experience Report., , , , и . PROFES, том 3009 из Lecture Notes in Computer Science, стр. 131-145. Springer, (2004)Empirical validation of pair programming.. ICSE, стр. 654. ACM, (2005)SBOM Ouverture: What We Need and What We Have., , , и . ARES, стр. 116:1-116:9. ACM, (2024)Static Analysis of Malicious Java Applets., , , , и . IWSPA@CODASPY, стр. 58-63. ACM, (2016)