Author of the publication

Factors Impacting the Effort Required to Fix Security Vulnerabilities - An Industrial Case Study.

, , , , , and . ISC, volume 9290 of Lecture Notes in Computer Science, page 102-119. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time for Addressing Software Security Issues: Prediction Models and Impacting Factors., , , , and . Data Science and Engineering, 2 (2): 107-124 (2017)Evaluation of the Challenges of Developing Secure Software Using the Agile Approach., , , , and . Int. J. Secur. Softw. Eng., 7 (1): 17-37 (2016)Likelihood of Threats to Connected Vehicles., , , , and . IJNGC, (2014)Literature Review of the Challenges of Developing Secure Software Using the Agile Approach., , and . ARES, page 540-547. IEEE Computer Society, (2015)A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks., , , , , and . J. Network and Computer Applications, (2014)Demo: A Low-Cost Fleet Monitoring System., , , , , , and . ISC2, page 1-2. IEEE, (2018)Mindset for Software Architecture Students., and . COMPSAC (2), page 306-311. IEEE, (2019)Identification of the Impacts of Code Changes on the Security of Software., , and . COMPSAC (2), page 569-574. IEEE, (2019)An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing., , , , , , and . SRDS, page 177-183. IEEE Computer Society, (2010)An End-to-End Security Auditing Approach for Service Oriented Architectures., , , , , , , and . SRDS, page 279-284. IEEE Computer Society, (2012)