Personensuche
X
?
Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering ,
1
Does trainer gender make a difference when delivering phish..:
, In:
?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings ,
2
On the Effects of Program Slicing for Vulnerability Detecti..:
, In:
?
Artificial Intelligence for Security ,
3
To Know What You Do Not Know: Challenges for Explainable AI..:
, In:
?
2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) ,
4
On the Effects of Program Slicing for Vulnerability Detecti..:
, In:
?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings ,
5
Automated Security Repair for Helm Charts:
, In:
?
2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) ,
7
Automated Security Repair for Helm Charts:
, In:
?
2022 IEEE 15th International Conference on Cloud Computing (CLOUD) ,
13
Towards a Security Stress-Test for Cloud Configurations:
, In:
?
Proceedings of the Third Workshop on Gender Equality, Diversity, and Inclusion in Software Engineering ,
14
The role of diversity in cybersecurity risk analysis : a..:
, In:
?
2022 IEEE/ACM 3rd International Workshop on Gender Equality, Diversity and Inclusion in Software Engineering (GEICSE) ,
15