Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2024 journal article
A Survey on Software Vulnerability Exploitability Assessment
ACM COMPUTING SURVEYS, 56(8).
2023 journal article
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey
ACM COMPUTING SURVEYS, 55(12).
2022 journal article
Why secret detection tools are not enough: It's not just about false positives-An industrial case study
EMPIRICAL SOFTWARE ENGINEERING, 27(3).
2021 journal article
Security Smells in Ansible and Chef Scripts: A Replication Study
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 30(1).
2020 article
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts
20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2020), pp. 516–525.
2019 article
Share, But Be Aware: Security Smells in Python Gists
2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), pp. 536–540.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.