Works (7)

Updated: July 5th, 2023 15:37

2021 journal article

Improving Vulnerability Inspection Efficiency Using Active Learning


By: Z. Yu n, C. Theisen n, L. Williams n & T. Menzies n

author keywords: Inspection; Software; Tools; Security; Predictive models; Error correction; NIST; Active learning; security; vulnerabilities; software engineering; error correction
TL;DR: HARMLESS is an incremental support vector machine tool that builds a vulnerability prediction model from the source code inspected to date, then suggests what source code files should be inspected next, then provides feedback on when to stop. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: November 12, 2021

2020 journal article

Better together: Comparing vulnerability prediction models


By: C. Theisen n & L. Williams n

author keywords: Security; Vulnerabilities; Prediction model; Software engineering
TL;DR: This paper compares VPMs on Mozilla Firefox with 28,750 source code files featuring 271 vulnerabilities using software metrics, text mining, and crash data to help security practitioners and researchers choose appropriate features for vulnerability prediction through a comparison of Vulnerability Prediction Models. (via Semantic Scholar)
Source: Web Of Science
Added: March 2, 2020

2018 review

Attack surface definitions: A systematic literature review


By: C. Theisen n, N. Munaiah*, M. Al-Zyoud*, J. Carver*, A. Meneely* & L. Williams n

author keywords: Attack surface; Vulnerabilities; Software engineering; Systematic literature review
TL;DR: This systematic literature review reviewed 644 works from prior literature that use the phrase attack surface and categorized them into those that provided their own definition; cited another definition; or expected the reader to intuitively understand the phrase. (via Semantic Scholar)
Source: Web Of Science
Added: November 19, 2018

2017 journal article

Twist-3 Distribution Amplitudes of Pion in the Light-Front Quark Model

Few-Body Systems, 58(2).

By: H. Choi* & C. Ji n

Sources: Web Of Science, Crossref, NC State University Libraries
Added: August 6, 2018

2016 conference paper

Reusing stack traces: Automated attack surface approximation

2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C), 859–862.

By: C. Theisen

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Stack traces reveal attack surfaces

Perspectives on Data Science for Software Engineering, 73–76.

By: C. Theisen & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Automated attack surface approximation

2015 10th Joint Meeting of the European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering (ESEC/FSE 2015) Proceedings, 1063–1065.

By: C. Theisen

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.