Author of the publication

Questions developers ask while diagnosing potential security vulnerabilities with static analysis.

, , , , and . ESEC/SIGSOFT FSE, page 248-259. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An exploratory study of blind software developers., and . VL/HCC, page 71-74. IEEE, (2012)How the Sando Search Tool Recommends Queries., , , and . CoRR, (2014)Designing Interventions to Persuade Software Developers to Adopt Security Tools., , , and . SIW@CCS, page 35-38. ACM, (2014)Interactive Code Annotation for Security Vulnerability Detection., , , and . SIW@CCS, page 17-22. ACM, (2014)Quantifying developers' adoption of security tools., , , , , and . ESEC/SIGSOFT FSE, page 260-271. ACM, (2015)Designing for dystopia: software engineering research for the post-apocalypse., , , and . SIGSOFT FSE, page 924-927. ACM, (2016)Restructuring software with gestures., , and . VL/HCC, page 165-172. IEEE, (2011)Sentiment and politeness analysis tools on developer discussions are unreliable, but so are people., , , and . SEmotion@ICSE, page 55-61. ACM, (2018)Which contributions predict whether developers are accepted into github teams., , , , , , and . MSR, page 403-413. ACM, (2018)Traits: experience with a language feature., and . OOPSLA Companion, page 275-282. ACM, (2004)