2024 journal article
A Survey on Software Vulnerability Exploitability Assessment
ACM COMPUTING SURVEYS, 56(8).
2022 journal article
Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application
EMPIRICAL SOFTWARE ENGINEERING, 27(6).
2021 article
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard
2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021), pp. 95–104.
2021 article
Vulnerability Detection is Just the Beginning
2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), pp. 304–308.
2016 conference paper
systematically developing prevention, detection, and response patterns for security requirements
2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.