Gkortzis, Antonios
14  Ergebnisse:
Personensuche X
?
3

A Double-Edged Sword? Software Reuse and Potential Security..:

, In: Lecture Notes in Computer Science; Reuse in the Big Data Era,
 
?
4

VulinOSS : a dataset of security vulnerabilities in open..:

, In: Proceedings of the 15th International Conference on Mining Software Repositories,
 
?
6

A methodology on extracting reusable software candidate com..:

, In: Proceeding of the 16th International Academic MindTrek Conference,
 
?
7

Software reuse cuts both ways:An empirical analysis of its ..:

Gkortzis, Antonios ; Feitosa, Daniel ; Spinellis, Diomidis
https://research.rug.nl/en/publications/8b99ca2b-f90e-464f-91fb-e1e4a6efddb2.  , 2021
 
?
8

CODE reuse in practice:Benefiting or harming technical debt:

Feitosa, Daniel ; Ampatzoglou, Apostolos ; Gkortzis, Antonios..
https://research.rug.nl/en/publications/f65caa72-8bc0-4c01-b572-0503fdb84d65.  , 2020
 
?
9

A Double-Edged Sword? Software Reuse and Potential Security..:

Gkortzis, Antonios ; Feitosa, Daniel ; Spinellis, Diomidis
https://research.rug.nl/en/publications/b86a116d-0ece-43e3-a181-de90f8a3f990.  , 2019
 
?
10

Identifying Extract Method Refactoring Opportunities Based ..:

Charalampidou, Sofia ; Ampatzoglou, Apostolos ; Chatzigeorgiou, Alexander..
https://research.rug.nl/en/publications/7a6aee20-19be-4533-9aed-765b49c61334.  , 2017
 
?
11

An Embedded Multiple-Case Study on OSS Design Quality Asses..:

Ampatzoglou, Apostolos ; Gkortzis, Antonios ; Charalampidou, Sofia.
https://research.rug.nl/en/publications/9b47fae8-a95c-4177-9948-ea76222230ba.  , 2013
 
1-14