Works (8)

2022 article

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

2022 MINING SOFTWARE REPOSITORIES CONFERENCE (MSR 2022), pp. 144–155.

By: R. Shu, T. Xia, L. Williams & T. Menzies

author keywords: Security Vulnerability Prediction; Class Imbalance; Hyperparameter Optimization; Generative Adversarial Networks
Source: Web Of Science
Added: September 19, 2022

2022 journal article

Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application

EMPIRICAL SOFTWARE ENGINEERING, 27(6).

By: S. Elder, N. Zahan, R. Shu, M. Metro, V. Kozarev, T. Menzies, L. Williams

author keywords: Vulnerability Management; Web Application Security; Penetration Testing; Vulnerability Scanners
Source: Web Of Science
Added: August 22, 2022

2022 journal article

Omni: automated ensemble with unexpected models against adversarial evasion attack

EMPIRICAL SOFTWARE ENGINEERING, 27(1).

By: R. Shu, T. Xia, L. Williams & T. Menzies

author keywords: Hyperparameter optimization; Ensemble defense; Adversarial evasion attack
Source: Web Of Science
Added: December 6, 2021

2022 journal article

Predicting health indicators for open source projects (using hyperparameter optimization)

EMPIRICAL SOFTWARE ENGINEERING, 27(6).

By: T. Xia, W. Fu, R. Shu, R. Agrawal & T. Menzies

author keywords: Hyperparameter optimization; Project health; Machine learning
Source: Web Of Science
Added: July 5, 2022

2022 journal article

Sequential Model Optimization for Software Effort Estimation

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 48(6), 1994–2009.

By: T. Xia, R. Shu, X. Shen & T. Menzies

author keywords: Estimation; Software; Tools; Optimization; Data models; Task analysis; Mathematical model; Effort estimation; COCOMO; hyperparameter tuning; regression trees; sequential model optimization
Sources: Web Of Science, ORCID
Added: June 15, 2022

2021 journal article

How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)

EMPIRICAL SOFTWARE ENGINEERING, 26(3).

author keywords: Hyperparameter Optimization; Data pre-processing; Security bug report
Source: Web Of Science
Added: May 3, 2021

2021 article

Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard

2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021), pp. 95–104.

By: S. Elder, N. Zahan, V. Kozarev n, R. Shu, T. Menzies & L. Williams

author keywords: Security and Protection; Computer and Information Science Education; Industry-Standards
Source: Web Of Science
Added: November 1, 2021

2016 journal article

A Study of Security Isolation Techniques

ACM COMPUTING SURVEYS, 49(3).

author keywords: Security isolation; access control; resilient architectures
Source: Web Of Science
Added: August 6, 2018