Tosin Daniel Oyetoyan
Tosin Daniel Oyetoyan
Associate Professor, Western Norway University of Applied Sciences
Verified email at hvl.no
Title
Cited by
Cited by
Year
An empirical study on the relationship between software security skills, usage and training needs in agile settings
TD Oyetoyan, DS Cruzes, MG Jaatun
2016 11th International Conference on Availability, Reliability and Security …, 2016
352016
A study of cyclic dependencies on defect profile of software components
TD Oyetoyan, DS Cruzes, R Conradi
Journal of Systems and Software 86 (12), 3162-3182, 2013
352013
How is security testing done in agile teams? A cross-case analysis of four software teams
DS Cruzes, M Felderer, TD Oyetoyan, M Gander, I Pekaric
International Conference on Agile Software Development, 201-216, 2017
322017
Myths and facts about static application security testing tools: an action research at telenor digital
TD Oyetoyan, B Milosheska, M Grini, DS Cruzes
International Conference on Agile Software Development, 86-103, 2018
202018
Bringing the cloud to rural and remote areas via cloudlets
S Helmer, C Pahl, J Sanin, L Miori, S Brocanelli, F Cardano, D Gadler, ...
Proceedings of the 7th Annual Symposium on Computing for Development, 1-10, 2016
152016
Circular Dependencies and Change-Proneness: An Empirical Study
TD Oyetoyan, JR Falleri, J Dietrich, K Jezek
22nd IEEE International Conference on Software Analysis, Evolution, and …, 2015
152015
A lightweight measurement of software security skills, usage and training needs in agile teams
TD Oyetoyan, MG Jaatun, DS Cruzes
International Journal of Secure Software Engineering (IJSSE) 8 (1), 1-27, 2017
92017
Criticality of defects in cyclic dependent components
TD Oyetoyan, R Conradi, DS Cruzes
2013 IEEE 13th International Working Conference on Source Code Analysis and …, 2013
92013
Comparing ci methods for prediction models in environmental engineering
O Flasch, T Bartz-Beielstein, A Davtyan, P Koch, W Konen, TD Oyetoyan, ...
Proc. of CEC, 2010
82010
A Decision Support System to Refactor Class Cycles
TD Oyetoyan, DS Cruzes, C Thurmann-Nielsen
31st International Conference on Software Maintenance and Evolution ICSME2015, 2015
72015
Understanding challenges to adoption of the Microsoft Elevation of Privilege game
IA Tøndel, TD Oyetoyan, MG Jaatun, D Cruzes
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
62018
Initial survey of Smart Grid activities in the Norwegian energy sector-use cases, industrial challenges and implications for research
TD Oyetoyan, R Conradi, K Sand
2012 First International Workshop on Software Engineering Challenges for the …, 2012
62012
Challenges and approaches of performing canonical action research in software security
DS Cruzes, MG Jaatun, TD Oyetoyan
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
52018
Transition and defect patterns of components in dependency cycles during software evolution
TD Oyetoyan, DS Cruzes, R Conradi
2014 Software Evolution Week-IEEE Conference on Software Maintenance …, 2014
42014
Can refactoring cyclic dependent components reduce defect-proneness?
TD Oyetoyan, DS Cruzes, R Conradi
2013 IEEE International Conference on Software Maintenance, 420-423, 2013
42013
Self-Organizing Map based operating regime estimation for state based control of Wastewater Treatment Plants
P Kern, C Wolf, M Bongards, TD Oyetoyan, S McLoone
2011 International Conference of Soft Computing and Pattern Recognition …, 2011
42011
Comparing SPO-tuned GP and NARX prediction models for stormwater tank fill level prediction
O Flasch, T Bartz-Beielstein, A Davtyan, P Koch, W Konen, TD Oyetoyan, ...
IEEE Congress on Evolutionary Computation, 1-8, 2010
42010
A data-driven security game to facilitate information security education
DEH Løvgren, J Li, TD Oyetoyan
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
32019
Measuring Developers' Software Security Skills, Usage, and Training Needs
TD Oyetoyan, MGG Jaatun, DS Cruzes
Exploring Security in Software Architecture and Design, 260-286, 2019
32019
Understanding challenges to adoption of the Protection Poker software security game
IA Tøndel, MG Jaatun, D Cruzes, TD Oyetoyan
Computer Security, 153-172, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20