Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulnerability Recognition by Execution Trace Differentiation, , and . 8th Symposium on Software Performance 2017, Karlsruhe, (2017)Community Knowledge About Security: - Identification and Classification of User Contributions., , , and . CRiSIS, volume 12528 of Lecture Notes in Computer Science, page 181-197. Springer, (2020)Are Third-Party Libraries Secure? A Software Library Checker for Java., , , and . CRiSIS, volume 11391 of Lecture Notes in Computer Science, page 18-34. Springer, (2018)Detecting Security Vulnerabilities using Clone Detection and Community Knowledge, , , and . The 31st International Conference on Software Engineering and Knowledge Engineering, SEKE 2019, Hotel Tivoli, Lisbon, Portugal, July 10-12, 2019, page 245--324. (2019)Heuristic and knowledge-based security checks of source code artifacts using community knowledge.. University of Hanover, Hannover, Germany, (2021)Tacit Knowledge in Software Evolution, , , and . Managed Software Evolution, (2019)Maintaining Security in Software Evolution, , , , , , , , , and 4 other author(s). Managed Software Evolution, (2019)Detecting Security Vulnerabilities using Clone Detection and Community Knowledge., , , and . SEKE, page 245-324. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2019)