Cited By
View all- Le Pochat VJoosen W(2023)Analyzing Cyber Security Research Practices through a Meta-Research FrameworkProceedings of the 16th Cyber Security Experimentation and Test Workshop10.1145/3607505.3607523(64-74)Online publication date: 7-Aug-2023
- Parhami B(2016)Low Acceptance Rates of Conference Papers Considered HarmfulComputer10.1109/MC.2016.10649:4(70-73)Online publication date: 1-Apr-2016
- Rozier KRozier EJoffe E(2014)Reproducibility, correctness, and buildabilityProceedings of the IEEE 2014 International Symposium on Ethics in Engineering, Science, and Technology10.5555/2960587.2960611(1-13)Online publication date: 23-May-2014
- Show More Cited By