Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What is software quality for AI engineers?: towards a thinning of the fog., , and . CAIN, page 1-9. ACM, (2022)Data smells: categories, causes and consequences, and detection of suspicious data in AI-based systems., , and . CAIN, page 229-239. ACM, (2022)Towards Understanding the Skill Gap in Cybersecurity., , , , , and . ITiCSE (1), page 477-483. ACM, (2022)Enhancing Model Driven Security through Pattern Refinement Techniques., , , and . FMCO, volume 7542 of Lecture Notes in Computer Science, page 169-183. Springer, (2011)Streamlining Attack Tree Generation: A Fragment-Based Approach., , , , , , , and . HICSS, page 7447-7456. ScholarSpace, (2024)SoHist: A Tool for Managing Technical Debt through Retro Perspective Code Analysis., , , , and . EASE, page 184-187. ACM, (2023)Impact of Students' Presence and Course Participation on Learning Outcome in Co-Operative Online-based Courses., , , , , , and . ICIMTH, volume 262 of Studies in Health Technology and Informatics, page 87-90. IOS Press, (2019)Requirements-based testing with defect taxonomies., and . Software Engineering & Management, volume P-239 of LNI, page 108-109. GI, (2015)Technical Debt in Data-Intensive Software Systems., , and . SEAA, page 338-341. IEEE, (2019)Collaborative Artificial Intelligence Needs Stronger Assurances Driven by Risks., , , , , , , and . Computer, 55 (3): 52-63 (2022)