Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Relationship between Software Complexity and Security., and . CoRR, (2020)An investigation into the best practices for the successful design and implementation of lightweight software process assessment methods: A systematic literature review., , , and . J. Syst. Softw., (2015)Process improvement in governmental agencies: Toward CMMI certification., , , and . ISSRE Workshops, page 168-173. IEEE Computer Society, (2015)Software Security Specifications and Design: How Software Engineers and Practitioners Are Mixing Things up., , and . EASE, page 451-456. ACM, (2020)TPV: A Tool for Validating Temporal Properties in UML Class Diagrams., , , , and . ICSE Companion, page 114-118. ACM, (2024)Online Banking Security and Usability - Towards an Effective Evaluation Framework., , , and . WEBIST, page 141-149. SciTePress, (2015)Gained Experience by Making Intervention to Improve Software Process in Very Small Organizations., , , , , and . SPICE, volume 290 of Communications in Computer and Information Science, page 51-61. Springer, (2012)Toward a national strategy for Open Source Software., , , and . SIIT, page 1-12. IEEE, (2013)Evaluation of Software Process Assessment Methods - Case Study., , and . SPICE, volume 155 of Communications in Computer and Information Science, page 42-51. Springer, (2011)