Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Code Analysis Opportunities and Challenges for Enterprise Systems and Microservices., , , , , , , , and . IEEE Access, (2020)Pex Extension for Generating User Input Validation Code for Web Applications., , and . ICSOFT EA, page 315-320. SciTePress, (2014)Transformation of IFML schemas to automated tests., , and . RACS, page 509-511. ACM, (2015)On Vulnerability and Security Log analysis: A Systematic Literature Review on Recent Trends., , , , , , , , and . RACS, page 175-180. ACM, (2020)On Persistent Implications of E2E Testing., and . ICEIS (Revised Selected Papers), volume 455 of Lecture Notes in Business Information Processing, page 326-338. Springer, (2021)Formal specification to support advanced model based testing., , and . FedCSIS, page 1311-1314. (2012)Mapping Study on Constraint Consistency Checking in Distributed Enterprise Systems., , , , , , , and . RACS, page 167-174. ACM, (2020)Reducing user input validation code in web applications using Pex extension., , and . CompSysTech, page 302-308. ACM, (2014)Tapir: Automation Support of Exploratory Testing Using Model Reconstruction of the System Under Test., , and . CoRR, (2018)Architectural languages in the microservice era: a systematic mapping study., , , , , , and . RACS, page 39-46. ACM, (2022)