Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The sigmoidal growth of operating system security vulnerabilities: An empirical revisit., , and . Computers & Security, (2015)Diversification and obfuscation techniques for software security: A systematic literature review., , , , , , and . Information & Software Technology, (2018)Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue?, , and . WIMS, page 26:1-26:12. ACM, (2016)Adoption and Suitability of Software Development Methods and Practices., , , , , , , and . APSEC, page 369-372. IEEE Computer Society, (2016)Individual People as Champions in Building an Emerging Software Ecosystem., , and . ICSOB, volume 336 of Lecture Notes in Business Information Processing, page 3-9. Springer, (2018)Top Management Support for Software Cost Estimation - A Case Study of the Current Practice and Impacts., , , , and . PROFES, volume 10611 of Lecture Notes in Computer Science, page 89-107. Springer, (2017)Multi-homing and Software Firm Performance - Towards a Research Agenda., , and . I3E, volume 10595 of Lecture Notes in Computer Science, page 442-452. Springer, (2017)Exploring the Stability of Software with Time-Series Cross-Sectional Data., , and . SAM@ICSE, page 41-47. IEEE Computer Society, (2015)Platform-Driven Ecosystem Prefacing for Emerging Markets in Developing Countries., , , , , , and . IWSECO, volume 2053 of CEUR Workshop Proceedings, page 74-87. CEUR-WS.org, (2017)Securing Scrum for VAHTI., , and . SPLST, volume 1525 of CEUR Workshop Proceedings, page 236-250. CEUR-WS.org, (2015)