Search for persons
X
?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings ,
1
On the Effects of Program Slicing for Vulnerability Detecti..:
, In:
?
Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering ,
2
Does trainer gender make a difference when delivering phish..:
, In:
?
Artificial Intelligence for Security ,
3
To Know What You Do Not Know: Challenges for Explainable AI..:
, In:
?
2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) ,
4
Automated Security Repair for Helm Charts:
, In:
?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings ,
6
Automated Security Repair for Helm Charts:
, In:
?
2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) ,
7
On the Effects of Program Slicing for Vulnerability Detecti..:
, In:
?
Proceedings of the Third Workshop on Gender Equality, Diversity, and Inclusion in Software Engineering ,
10
The role of diversity in cybersecurity risk analysis : a..:
, In:
?
2022 IEEE 15th International Conference on Cloud Computing (CLOUD) ,
11
Towards a Security Stress-Test for Cloud Configurations:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
13
Precise Analysis of Purpose Limitation in Data Flow Diagram:
, In:
?
2022 IEEE/ACM 3rd International Workshop on Gender Equality, Diversity and Inclusion in Software Engineering (GEICSE) ,
14