Search for persons
X
?
Proceedings of the 21st International Conference on Mining Software Repositories ,
1
What Can Self-Admitted Technical Debt Tell Us About Securit..:
, In:
?
2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) ,
2
CATMA: Conformance Analysis Tool For Microservice Applicati..:
, In:
?
2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS) ,
4
GitHub Considered Harmful? Analyzing Open-Source Projects f..:
, In:
?
Proceedings of the International Conference on Evaluation and Assessment in Software Engineering 2022 ,
5
Conversational DevBots for Secure Programming: An Empirical..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
7
STRIPED: A Threat Analysis Method for IoT Systems:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
8
SoK: Security of Microservice Applications: A Practitioners..:
, In:
?
Proceedings of the 17th International Conference on Availability, Reliability and Security ,
9
Towards a Security Benchmark for the Architectural Design o..:
, In:
?
Proceedings of the 2022 European Symposium on Usable Security ,
10
ENAGRAM: An App to Evaluate Preventative Nudges for Instagr..:
, In:
?
2018 16th Annual Conference on Privacy, Security and Trust (PST) ,
13
At Your Own Risk: Shaping Privacy Heuristics for Online Sel..:
, In:
?
Lecture Notes in Computer Science; Social Informatics ,
14
Access-Control Prediction in Social Network Sites: Examinin..:
, In:
?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings ,
15