From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities., , и . APSEC, стр. 31-40. IEEE, (2020)Characterizing Software Architecture Changes: An Initial Study., и . ESEM, стр. 410-419. ACM / IEEE Computer Society, (2007)Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities., , и . HASE, стр. 69-76. IEEE Computer Society, (2017)Human Subject Evaluation of Computer-Security Training Recommender., , , и . COMPSAC, стр. 251-256. IEEE Computer Society, (2016)A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories., , и . ITNG, стр. 534-539. IEEE Computer Society, (2015)High false positive detection of security vulnerabilities: a case study., , и . ACM Southeast Regional Conference, стр. 359-360. ACM, (2012)Managing technical debt: an industrial case study., и . MTD@ICSE, стр. 8-15. IEEE Computer Society, (2013)The Correspondence Between Software Quality Models and Technical Debt Estimation Approaches., , , , , и . MTD@ICSME, стр. 19-26. IEEE Computer Society, (2014)A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities., , и . COMPSAC, стр. 257-262. IEEE Computer Society, (2016)Technical debt prioritization using predictive analytics., и . ICSE (Companion Volume), стр. 704-706. ACM, (2016)