Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2023 journal article
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey
ACM COMPUTING SURVEYS, 55(12).
2022 journal article
Why secret detection tools are not enough: It's not just about false positives-An industrial case study
EMPIRICAL SOFTWARE ENGINEERING, 27(3).
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2020), pp. 516–525.
Share, But Be Aware: Security Smells in Python Gists
2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), pp. 536–540.