Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A systematic classification of security regression testing approaches., and . STTT, 17 (3): 305-319 (2015)A process for mastering security evolution in the development lifecycle., and . STTT, 17 (3): 245-250 (2015)Model-Driven System Testing of Service Oriented Systems - A Standard-aligned Approach based on Independent System and Test Models., , and . ICEIS (3), page 428-435. SciTePress, (2010)Risk-based data validation in machine learning-based software systems., and . MaLTeSQuE@ESEC/SIGSOFT FSE, page 13-18. ACM, (2019)Experiences and Challenges of Introducing Risk-Based Testing in an Industrial Project., and . SWQD, volume 133 of Lecture Notes in Business Information Processing, page 10-29. Springer, (2013)Integrating Manual and Automatic Risk Assessment for Risk-Based Testing., , , and . SWQD, volume 94 of Lecture Notes in Business Information Processing, page 159-180. Springer, (2012)Research Challenges in Empowering Agile Teams with Security Knowledge Based on Public and Private Information Sources., and . SecSE@ESORICS, volume 1977 of CEUR Workshop Proceedings, page 1-7. CEUR-WS.org, (2017)Towards Adaptive Test Code Generation for Service Oriented Systems., , , , and . QSIC, page 155-160. IEEE Computer Society, (2009)A Concept for Language-Oriented Security Testing., , , and . SERE (Companion), page 53-62. IEEE, (2013)2nd International Workshop on Requirements Engineering and Testing (RET 2015)., , , , , and . ICSE (2), page 997-998. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).