Curating GitHub for Engineered Software Projects N Munaiah, S Kroh, C Cabrey, M Nagappan Empirical Software Engineering 22 (6), 3219–3253, 2017 | 435 | 2017 |
Attack surface definitions: A systematic literature review C Theisen, N Munaiah, M Al-Zyoud, JC Carver, A Meneely, L Williams Information and Software Technology 104, 94-103, 2018 | 71 | 2018 |
The impact of cross-platform development approaches for mobile applications from the user's perspective IT Mercado, N Munaiah, A Meneely Proceedings of the International Workshop on App Market Analytics, 43-49, 2016 | 67 | 2016 |
Vulnerability severity scoring and bounties: Why the disconnect? N Munaiah, A Meneely Proceedings of the 2nd International Workshop on Software Analytics, 8-14, 2016 | 52 | 2016 |
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project N Munaiah, F Camilo, W Wigham, A Meneely, M Nagappan Empirical Software Engineering 22, 1305-1347, 2017 | 46 | 2017 |
Characterizing attacker behavior in a cybersecurity penetration testing competition N Munaiah, A Rahman, J Pelletier, L Williams, A Meneely 2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019 | 45 | 2019 |
Beyond the attack surface: Assessing security risk with random walks on call graphs N Munaiah, A Meneely Proceedings of the 2016 ACM Workshop on Software PROtection, 3-14, 2016 | 28 | 2016 |
A domain-independent model for identifying security requirements N Munaiah, A Meneely, PK Murukannaiah 2017 IEEE 25th International Requirements Engineering Conference (RE), 506-511, 2017 | 26 | 2017 |
Who added that permission to my app? an analysis of developer permission changes in open source android apps DE Krutz, N Munaiah, A Peruma, MW Mkaouer 2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017 | 19 | 2017 |
Examining the relationship between security metrics and user ratings of mobile apps: A case study DE Krutz, N Munaiah, A Meneely, SA Malachowsky Proceedings of the International Workshop on App Market Analytics, 8-14, 2016 | 17 | 2016 |
Are intrusion detection studies evaluated consistently? a systematic literature review N Munaiah, A Meneely, R Wilson, B Short RIT Scholar Works. Sep, 2016 | 17 | 2016 |
A cybersecurity dataset derived from the national collegiate penetration testing competition N Munaiah, J Pelletier, SH Su, S Yang, A Meneely HICSS Symposium on cybersecurity big data analytics, 2019 | 16 | 2019 |
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ... Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017 | 16 | 2017 |
Darwin: A static analysis dataset of malicious and benign android apps N Munaiah, C Klimkowsky, S McRae, A Blaine, SA Malachowsky, C Perez, ... Proceedings of the International Workshop on App Market Analytics, 26-29, 2016 | 15 | 2016 |
Continuous data-driven software engineering-towards a research agenda: Report on the joint 5th international workshop on rapid continuous software engineering (rcose 2019) and … I Gerostathopoulos, M Konersmann, S Krusche, DI Mattos, J Bosch, ... ACM SIGSOFT Software Engineering Notes 44 (3), 60-64, 2019 | 11 | 2019 |
A dataset for identifying actionable feedback in collaborative software development BS Meyers, N Munaiah, E Prud’Hommeaux, A Meneely, J Wolff, CO Alm, ... Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018 | 10 | 2018 |
Data-driven insights from vulnerability discovery metrics N Munaiah, A Meneely 2019 IEEE/ACM Joint 4th International Workshop on Rapid Continuous Software …, 2019 | 9 | 2019 |
Pragmatic characteristics of security conversations: an exploratory linguistic analysis BS Meyers, N Munaiah, A Meneely, E Prud'hommeaux 2019 IEEE/ACM 12th International Workshop on Cooperative and Human Aspects …, 2019 | 7 | 2019 |
Assisted discovery of software vulnerabilities N Munaiah Proceedings of the 40th International Conference on Software Engineering …, 2018 | 7 | 2018 |
Systematization of Vulnerability Discovery Knowledge: Review Protocol N Munaiah, A Meneely arXiv preprint arXiv:1902.03331, 2019 | 1 | 2019 |