Author:
Hallett Joseph,Patnaik Nikhil,Shreeve Benjamin,Rashid Awais
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Guidelines for using financial incentives in software-engineering experimentation;Empirical Software Engineering;2024-08-10
2. Parola Saklama Tekniklerinin Evrimi ve Güncel En İyi Uygulamaları;Eskişehir Türk Dünyası Uygulama ve Araştırma Merkezi Bilişim Dergisi;2023-12-27
3. Security Champions Without Support: Results from a Case Study with OWASP SAMM in a Large-Scale E-Commerce Enterprise;Proceedings of the 2023 European Symposium on Usable Security;2023-10-16
4. The State of Secure Coding Practice: Small Organisations and “Lone, Rogue Coders”;2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS);2023-05
5. Studying Secure Coding in the Laboratory: Why, What, Where, How, and Who?;2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS);2023-05