Author of the publication

High false positive detection of security vulnerabilities: a case study.

, , and . ACM Southeast Regional Conference, page 359-360. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities., , and . APSEC, page 31-40. IEEE, (2020)Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities., , and . HASE, page 69-76. IEEE Computer Society, (2017)Characterizing Software Architecture Changes: An Initial Study., and . ESEM, page 410-419. ACM / IEEE Computer Society, (2007)Human Subject Evaluation of Computer-Security Training Recommender., , , and . COMPSAC, page 251-256. IEEE Computer Society, (2016)Technical debt prioritization using predictive analytics., and . ICSE (Companion Volume), page 704-706. ACM, (2016)A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities., , and . COMPSAC, page 257-262. IEEE Computer Society, (2016)High false positive detection of security vulnerabilities: a case study., , and . ACM Southeast Regional Conference, page 359-360. ACM, (2012)Managing technical debt: an industrial case study., and . MTD@ICSE, page 8-15. IEEE Computer Society, (2013)The Correspondence Between Software Quality Models and Technical Debt Estimation Approaches., , , , , and . MTD@ICSME, page 19-26. IEEE Computer Society, (2014)A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories., , and . ITNG, page 534-539. IEEE Computer Society, (2015)