Author of the publication

Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities.

, , , , and . ESSoS, volume 10379 of Lecture Notes in Computer Science, page 53-69. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities., , , , and . ESSoS, volume 10379 of Lecture Notes in Computer Science, page 53-69. Springer, (2017)A problem-solving perspective on governance and product design in open source software projects: Conceptual issues and exploratory evidence., , , and . ICIS, Association for Information Systems, (2013)Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases., , , and . WICSA, page 83-92. IEEE Computer Society, (2008)A Methodology for Operationalizing Enterprise IT Architecture and Evaluating its Modifiability., , , and . Complex Syst. Informatics Model. Q., (2019)2nd workshop on assessment of contemporary modularization techniques (ACoM 2008)., , , , , and . OOPSLA Companion, page 839-842. ACM, (2008)Exploring the Structure of Complex Software Designs: An Empirical Study of Open Source and Proprietary Code, , and . (2005)http://opensource.mit.edu/papers/maccormackrusnakbaldwin2.pdf.Managing technical debt in software-reliant systems., , , , , , , , , and 4 other author(s). FoSER, page 47-52. ACM, (2010)Visualizing and Measuring Enterprise Architecture: An Exploratory BioPharma Case., , , and . PoEM, volume 165 of Lecture Notes in Business Information Processing, page 9-23. Springer, (2013)Evolution Analysis of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory, , , and . Technical report, 07-081. Harvard Business School, (June 2007)Multivariate Unsupervised Machine Learning for Anomaly Detection in Enterprise Applications., , , and . HICSS, page 1-10. ScholarSpace, (2019)