Search for persons
X
?
Proceedings of the 21st International Conference on Mining Software Repositories ,
2
What Can Self-Admitted Technical Debt Tell Us About Securit..:
, In:
?
2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) ,
3
CATMA: Conformance Analysis Tool For Microservice Applicati..:
, In:
?
Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems ,
5
Regret, Delete, (Do Not) Repeat: An Analysis of Self-Cleani..:
, In:
?
2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS) ,
6
GitHub Considered Harmful? Analyzing Open-Source Projects f..:
, In:
?
Proceedings of the International Conference on Evaluation and Assessment in Software Engineering 2022 ,
7
Conversational DevBots for Secure Programming: An Empirical..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
9
STRIPED: A Threat Analysis Method for IoT Systems:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
10
SoK: Security of Microservice Applications: A Practitioners..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
11
Towards a Security Benchmark for the Architectural Design o..:
, In:
?
Proceedings of the 2022 European Symposium on Usable Security ,
12
ENAGRAM: An App to Evaluate Preventative Nudges for Instagr..:
, In:
?
International Conference on Social Media and Society ,
14
Building Trustworthiness in Computer-Mediated Introduction:..:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
15