From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Qualitative Study of Dependency Management and Its Security Implications., , и . CCS, стр. 1513-1531. ACM, (2020)Large-Scale Manual Validation of Bug Fixing Commits: A Fine-grained Analysis of Tangling., , , , , , , , , и 38 other автор(ы). CoRR, (2020)Machine Learning for Source Code Vulnerability Detection: What Works and What Isn't There Yet., , и . IEEE Secur. Priv., 20 (5): 60-76 (2022)Decision Support of Security Assessment of Software Vulnerabilities in Industrial Practice.. University of Trento, Italy, (2019)base-search.net (ftutrentophd:oai:eprints-phd.biblio.unitn.it:3812).Please hold on: more time = more patches? Automated program repair as anytime algorithms., , и . APR@ICSE, стр. 9-10. IEEE, (2021)Technical Leverage in a Software Ecosystem: Development Opportunities and Security Risks., и . ICSE, стр. 1386-1397. IEEE, (2021)Towards Using Source Code Repositories to Identify Software Supply Chain Attacks., , , , и . CCS, стр. 2093-2095. ACM, (2020)Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools., , и . ESEM, стр. 163-168. IEEE Computer Society, (2017)Technical Leverage: Dependencies Are a Mixed Blessing., и . IEEE Secur. Priv., 19 (3): 58-62 (2021)Security Maturity Self-Assessment Framework for Software Development Lifecycle., , и . ARES, стр. 118:1-118:8. ACM, (2022)