Cited By
View all- Wang JWang Q(2016)Analyzing and predicting software integration bugs using network analysis on requirements dependency networkRequirements Engineering10.1007/s00766-014-0215-x21:2(161-184)Online publication date: 1-Jun-2016
- Morrison PBertolino ACanfora GElbaum S(2015)A security practices evaluation frameworkProceedings of the 37th International Conference on Software Engineering - Volume 210.5555/2819009.2819218(935-938)Online publication date: 16-May-2015
- van der Spek PVerhoef C(2014)Balancing Time-to-Market and Quality in Embedded SystemsSystems Engineering10.1002/sys.2126117:2(166-192)Online publication date: 1-Jun-2014
- Show More Cited By