Displaying works 1 - 20 of 247 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2022 conference paper
ThirdEye: Attention Maps for Safe Autonomous Driving Systems
Stocco, A., Nunes, P. J., D'Amorim, M., & Tonella, P. (2022, October 10).
2022 journal article
Syrius: Synthesis of Rules for Intrusion Detectors
IEEE Transactions on Reliability.
2022 journal article
RVprio: A tool for prioritizing runtime verification violations
Software Testing, Verification and Reliability.
2022 conference paper
Leveraging Practitioners’ Feedback to Improve a Security Linter
Reis, S., Abreu, R., d'Amorim, M., & Fortunato, D. (2022, October 10).
2022 conference paper
Consent as a Foundation for Responsible Autonomy
Proceedings of the AAAI Conference on Artificial Intelligence, 36(11), 12301–12306.
Event: at Vancouver
2022 journal article
Teachable Agent as an Interactive Tool for Cognitive Task Analysis: A Case Study for Authoring an Expert Model
International Journal of Artificial Intelligence in Education, 32(1), 48–75.
2022 journal article
Principles and Practices for Application-Network Co-Design in Edge Computing
IEEE Network, 1–7.
2022 article
TEXT MINING OF THE PEOPLE'S PHARMACY RADIO SHOW TRANSCRIPTS CAN IDENTIFY NOVEL DRUG REPURPOSING HYPOTHESES
MedRxiv.
Contributors: R. Yedida* , J. Beasley*, D. Korn*, S. Abrar*, C. Melo-Filho *, E. Muratov *, J. Graedon*, T. Graedon*, R. Chirkova, A. Tropsha *
2022 article
How to Improve Deep Learning for Software Analytics (a case study with code smell detection)
ArXiv.
Contributors: R. Yedida* & T. Menzies
2022 article
How to Find Actionable Static Analysis Warnings: A Case Study with FindBugs
ArXiv.
Contributors: R. Yedida* , H. Kang, H. Tu, X. Yang, D. Lo & T. Menzies
2022 article
OpenSSF Scorecard: On the Path Toward Ecosystem-wide Automated Security Metrics
2022 journal article
Comparing Effectiveness and Efficiency of Interactive Application Security Testing (Iast) and Runtime Application Self-Protection (Rasp) Tools in A Large Java-Based System
SSRN Electronic Journal.
2022 conference paper
Removing the Reliance on Perimeters for Security using Network Views
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 151–162.
2022 chapter
Optimizing Honey Traffic Using Game Theory and Adversarial Learning
In Cyber Deception: Techniques, Strategies, and Human Aspects (pp. 97–124). Springer.
2022 conference paper
A Study of Application Sandbox Policies in Linux
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 19–30.
2022 conference paper
${$FReD$}$: Identifying File ${$Re-Delegation$}$ in Android System Services
31st USENIX Security Symposium (USENIX Security 22), 1525–1542.
2022 conference paper
${$ALASTOR$}$: Reconstructing the Provenance of Serverless Intrusions
31st USENIX Security Symposium (USENIX Security 22), 2443–2460.
2022 article
Comparing Accelerometry and Depth Sensing-Based Computer Vision for Canine Tail Wagging Interpretation
NINTH INTERNATIONAL CONFERENCE ON ANIMAL-COMPUTER INTERACTION, ACI 2022.
2022 article
Spatial and Temporal Analytic Pipeline for Evaluation of Potential Guide Dogs Using Location and Behavior Data
NINTH INTERNATIONAL CONFERENCE ON ANIMAL-COMPUTER INTERACTION, ACI 2022.
2022 article
Motion-Resilient ECG Signal Reconstruction from a Wearable IMU through Attention Mechanism and Contrastive Learning
NINTH INTERNATIONAL CONFERENCE ON ANIMAL-COMPUTER INTERACTION, ACI 2022.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.