Author of the publication

Diversification and obfuscation techniques for software security: A systematic literature review.

, , , , , , and . Information & Software Technology, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Time series trends in software evolution., , and . Journal of Software: Evolution and Process, 27 (12): 990-1015 (2015)The sigmoidal growth of operating system security vulnerabilities: An empirical revisit., , and . Computers & Security, (2015)Diversification and obfuscation techniques for software security: A systematic literature review., , , , , , and . Information & Software Technology, (2018)Exploring the Use of Deprecated PHP Releases in the Wild Internet: Still a LAMP Issue?, , and . WIMS, page 26:1-26:12. ACM, (2016)Individual People as Champions in Building an Emerging Software Ecosystem., , and . ICSOB, volume 336 of Lecture Notes in Business Information Processing, page 3-9. Springer, (2018)Adoption and Suitability of Software Development Methods and Practices., , , , , , , and . APSEC, page 369-372. IEEE Computer Society, (2016)Multi-homing and Software Firm Performance - Towards a Research Agenda., , and . I3E, volume 10595 of Lecture Notes in Computer Science, page 442-452. Springer, (2017)Top Management Support for Software Cost Estimation - A Case Study of the Current Practice and Impacts., , , , and . PROFES, volume 10611 of Lecture Notes in Computer Science, page 89-107. Springer, (2017)Securing Scrum for VAHTI., , and . SPLST, volume 1525 of CEUR Workshop Proceedings, page 236-250. CEUR-WS.org, (2015)Healthy until otherwise proven: some proposals for renewing research of software ecosystem health., , and . SoHeal@ICSE, page 18-24. ACM, (2018)