Tosin Daniel Oyetoyan

Orcid: 0000-0003-0027-4522

According to our database1, Tosin Daniel Oyetoyan authored at least 30 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Engineering Challenges of Stationary Wireless Smart Ocean Observation Systems.
IEEE Internet Things J., August, 2023

Synthesized Data Quality Requirements and Roadmap for Improving Reusability of In-Situ Marine Data.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023

Marine Data Observability using KPIS: An MDSE Approach.
Proceedings of the 26th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, 2023

Towards a Formal and Executable Software Architecture Specification of the Smart Ocean Data Service Platform.
Proceedings of the 2023 International Workshop on Petri Nets and Software Engineering (PNSE 2023) co-located with the 44th International Conference on Application and Theory of Petri Nets and Concurrency (PETRI NETS 2023), 2023

2022
Marine Data Sharing: Challenges, Technology Drivers and Quality Attributes.
Proceedings of the Product-Focused Software Process Improvement, 2022

Data Protection Fortification: An Agile Approach for Threat Analysis of IoT Data.
Proceedings of the 12th International Conference on the Internet of Things, 2022

2021
An improved text classification modelling approach to identify security messages in heterogeneous projects.
Softw. Qual. J., 2021

2020
OAS DB: A Repository of Specifications to Support OpenAPI Research.
Proceedings of the 13th Seminar Series on Advanced Techniques & Tools for Software Evolution, 2020

2019
A data-driven security game to facilitate information security education.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

2018
Myths and Facts About Static Application Security Testing Tools: An Action Research at Telenor Digital.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2018

Identifying security issues in software development: are keywords enough?
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Understanding challenges to adoption of the Microsoft elevation of privilege game.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Challenges and approaches of performing canonical action research in software security: research paper.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

Understanding Challenges to Adoption of the Protection Poker Software Security Game.
Proceedings of the Computer Security - ESORICS 2018 International Workshops, 2018

2017
A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams.
Int. J. Secur. Softw. Eng., 2017

How is Security Testing Done in Agile Teams? A Cross-Case Analysis of Four Software Teams.
Proceedings of the Agile Processes in Software Engineering and Extreme Programming, 2017

Comparing Capability of Static Analysis Tools to Detect Security Weaknesses in Mobile Applications.
Proceedings of the International Workshop on Secure Software Engineering in DevOps and Agile Development co-located with the 22nd European Symposium on Research in Computer Security (ESORICS 2017), 2017

2016
Bringing the Cloud to Rural and Remote Areas - Cloudlet by Cloudlet.
CoRR, 2016

Bringing the Cloud to Rural and Remote Areas via Cloudlets.
Proceedings of the 7th Annual Symposium on Computing for Development, 2016

An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Circular dependencies and change-proneness: An empirical study.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

A decision support system to refactor class cycles.
Proceedings of the 2015 IEEE International Conference on Software Maintenance and Evolution, 2015

2014
Transition and defect patterns of components in dependency cycles during software evolution.
Proceedings of the 2014 Software Evolution Week, 2014

2013
A study of cyclic dependencies on defect profile of software components.
J. Syst. Softw., 2013

Criticality of defects in cyclic dependent components.
Proceedings of the 13th IEEE International Working Conference on Source Code Analysis and Manipulation, 2013

A Comparison of Different Defect Measures to Identify Defect-Prone Components.
Proceedings of the 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement, 2013

Can Refactoring Cyclic Dependent Components Reduce Defect-Proneness?
Proceedings of the 2013 IEEE International Conference on Software Maintenance, 2013

2012
Initial survey of smart grid activities in the Norwegian energy sector: use cases, industrial challenges and implications for research.
Proceedings of the First International Workshop on Software Engineering Challenges for the Smart Grid, 2012

2011
Self-Organizing Map based operating regime estimation for state based control of wastewater treatment plants.
Proceedings of the Third International Conference of Soft Computing and Pattern Recognition, 2011

2010
Comparing SPO-tuned GP and NARX prediction models for stormwater tank fill level prediction.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010


  Loading...