Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guidelines for Systematic Mapping Studies in Security Engineering., and . CoRR, (2018)Defect Prevention in Requirements Using Human Error Information: An Empirical Study., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 61-76. Springer, (2017)Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report., , , , and . REFSQ, volume 10153 of Lecture Notes in Computer Science, page 370-377. Springer, (2017)Peer Code Review to Prevent Security Vulnerabilities: An Empirical Evaluation., and . SERE (Companion), page 229-230. IEEE, (2013)Step One Towards Science of Security., , and . SafeConfig@CCS, page 31-35. ACM, (2017)Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements., , and . Software Engineering Research and Practice, page 966-971. CSREA Press, (2006)Automating Systematic Literature Review., and . Contemporary Empirical Methods in Software Engineering, Springer, (2020)Educating Students to be Better Citizens of Tech Communities., and . SIGCSE (2), page 1053. ACM, (2022)Enabling Citizen Roboticists., , and . Enabling Intelligence through Middleware, volume WS-10-09 of AAAI Technical Report, AAAI, (2010)Using a Cognitive Psychology Perspective on Errors to Improve Requirements Quality: An Empirical Investigation., , , , and . ISSRE, page 65-76. IEEE Computer Society, (2016)