Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time series trends in software evolution., , and . Journal of Software: Evolution and Process, 27 (12): 990-1015 (2015)Diversification and obfuscation techniques for software security: A systematic literature review., , , , , , and . Information & Software Technology, (2018)The sigmoidal growth of operating system security vulnerabilities: An empirical revisit., , and . Computers & Security, (2015)Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue?, , and . WIMS, page 26:1-26:12. ACM, (2016)Adoption and Suitability of Software Development Methods and Practices., , , , , , , and . APSEC, page 369-372. IEEE Computer Society, (2016)Multi-homing and Software Firm Performance - Towards a Research Agenda., , and . I3E, volume 10595 of Lecture Notes in Computer Science, page 442-452. Springer, (2017)Top Management Support for Software Cost Estimation - A Case Study of the Current Practice and Impacts., , , , and . PROFES, volume 10611 of Lecture Notes in Computer Science, page 89-107. Springer, (2017)Individual People as Champions in Building an Emerging Software Ecosystem., , and . ICSOB, volume 336 of Lecture Notes in Business Information Processing, page 3-9. Springer, (2018)Platform-Driven Ecosystem Prefacing for Emerging Markets in Developing Countries., , , , , , and . IWSECO, volume 2053 of CEUR Workshop Proceedings, page 74-87. CEUR-WS.org, (2017)A Post-Mortem Empirical Investigation of the Popularity and Distribution of Malware Files in the Contemporary Web-Facing Internet., , , , , and . EISIC, page 144-147. IEEE Computer Society, (2016)