Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates., , , , , , and . Empir. Softw. Eng., 22 (4): 2127-2178 (2017)Building forensics in: supporting the investigation of digital criminal activities (invited talk).. SERF@ESEC/SIGSOFT FSE, page 1. ACM, (2017)Evaluating access control of open source electronic health record systems., and . SEHC@ICSE, page 63-70. ACM, (2011)Socio-technical developer networks: should we trust our measurements?, and . ICSE, page 281-290. ACM, (2011)An empirical model to predict security vulnerabilities using code complexity metrics., and . ESEM, page 315-317. ACM, (2008)Source Code Properties of Defective Infrastructure as Code Scripts., and . CoRR, (2018)How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)., , , , and . Empir. Softw. Eng., 26 (3): 53 (2021)Experiences in applying agile software development practices in new product development., , , , and . IASTED Conf. on Software Engineering and Applications, page 501-506. IASTED/ACTA Press, (2004)Towards improved security criteria for certification of electronic health record systems., , and . SEHC@ICSE, page 68-73. ACM, (2010)Early estimation of defect density using an in-process Haskell metrics model., , , and . A-MOST, ACM, (2005)