Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Engineering in the Wild: Understanding the Practitioners' Mindset, Organizational Aspects, and Current Practices., , and . IEEE Trans. Software Eng., 49 (9): 4324-4348 (September 2023)Enabling Spatial Digital Twins: Technologies, Challenges, and Future Research Directions., , , , and . CoRR, (2023)Demystifying the Mysteries of Security Vulnerability Discussions on Developer Q&A Sites., , , and . CoRR, (2020)Internet of Things Search Engine: Concepts, Classification, and Open Issues., , , , , and . CoRR, (2018)Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges., , and . CoRR, (2020)On the scalability of Big Data Cyber Security Analytics systems., and . J. Netw. Comput. Appl., (2022)An automated implementation of hybrid cloud for performance evaluation of distributed databases., , and . J. Netw. Comput. Appl., (2020)Toward a Reference Architecture for Software Supply Chain Metadata Management., , and . CoRR, (2023)Deep Learning for Source Code Modeling and Generation: Models, Applications, and Challenges., , and . ACM Comput. Surv., 53 (3): 62:1-62:38 (2021)Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline., , , , , , and . CoRR, (2021)