Author of the publication

An empirical investigation of transferring research to software technology innovation: a case of data-driven national security software.

, , and . ESEM, page 10:1-10:10. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Empirical Study of Automation in Software Security Patch Management., , , and . ASE, page 7:1-7:13. ACM, (2022)Knowledge sharing for common understanding of technical specifications through artifactual culture., and . EASE, page 11:1-11:10. ACM, (2014)Security Awareness of End-Users of Mobile Health Applications: An Empirical Study., , , and . MobiQuitous, page 125-136. ACM, (2020)SoK: Machine Learning for Continuous Integration., , , and . AIOps@ICSE, page 8-13. IEEE, (2023)A Study of Gender Discussions in Mobile Apps., , , and . MSR, page 598-610. IEEE, (2023)Software Security Patch Management - A Systematic Literature Review of Challenges, Approaches, Tools and Practices., , , and . CoRR, (2020)Exploring social structures in Extended Team Model., and . CHASE@ICSE, page 105-108. IEEE Computer Society, (2013)Security Support in Continuous Deployment Pipeline., , , , and . ENASE, page 57-68. SciTePress, (2017)Documenting Ethical Considerations in Open Source AI Models., , , , and . CoRR, (2024)What Can Self-Admitted Technical Debt Tell Us About Security? A Mixed-Methods Study., , , , and . MSR, page 704-715. ACM, (2024)