How your cms could be breeding security vulnerabili- ties, 2013. ,
Bootstrapping Software Engineering Training in Developing Countries -Return on Experience at the University of Ouagadougou, In AFRICOMM, 2014. ,
Bug characteristics in open source software, Empirical Software Engineering, vol.30, issue.9, pp.1665-1705, 2014. ,
DOI : 10.1007/s10664-013-9258-8
Diagnosys: automatic generation of a debugging interface to the linux kernel, Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineerinh, ASE'2012 ,
Ahead of time static analysis for automatic generation of debugging interfaces to the linux kernel, Automated Software Engineering, pp.1-39 ,
Popularity, interoperability, and impact of programming languages in 100,000 open source projects, Proceedings of the 37th Annual International Computer Software & Applications Conference, COMPSAC'2013, pp.1-10, 2013. ,
Sustainable ict4d in africa: Where do we go from here? In AFRICOMM, pp.95-103, 2013. ,
Vulnerabilities in e-governments, International Journal of Electronic Security and Digital Forensics, vol.1, issue.1, pp.89-100, 2007. ,
DOI : 10.1504/IJESDF.2007.013595
Temporal metrics for software vulnerabilities, Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, CSIIRW '08, pp.1-44, 2008. ,
On Race Vulnerabilities in Web Applications, Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, pp.126-142, 2008. ,
DOI : 10.1007/978-3-540-70542-0_7
Mitigating program security vulnerabilities, ACM Computing Surveys, vol.44, issue.3, pp.1-11, 2012. ,
DOI : 10.1145/2187671.2187673
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications, Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, SESS '10, pp.43-49, 2010. ,
DOI : 10.1145/1809100.1809107