Andrew Meneely

Orcid: 0000-0002-4850-1408

According to our database1, Andrew Meneely authored at least 42 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Taxonomy-Based Human Error Assessment for Senior Software Engineering Students.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
What Happens When We Fuzz? Investigating OSS-Fuzz Bug History.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

2022
Examining Penetration Tester Behavior in the Collegiate Penetration Testing Competition.
ACM Trans. Softw. Eng. Methodol., 2022

2021
Who are Vulnerability Reporters?: A Large-scale Empirical Study on FLOSS.
Proceedings of the ESEM '21: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2021

An Automated Post-Mortem Analysis of Vulnerability Relationships using Natural Language Word Embeddings.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2019
Systematization of Vulnerability Discovery Knowledge: Review Protocol.
CoRR, 2019

Data-driven insights from vulnerability discovery metrics.
Proceedings of the Joint 4th International Workshop on Rapid Continuous Software Engineering and 1st International Workshop on Data-Driven Decisions, 2019

Pragmatic characteristics of security conversations: an exploratory linguistic analysis.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019

Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

2018
Attack surface definitions: A systematic literature review.
Inf. Softw. Technol., 2018

A dataset for identifying actionable feedback in collaborative software development.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

2017
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project.
Empir. Softw. Eng., 2017

A Domain-Independent Model for Identifying Security Requirements.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

2016
Vulnerability severity scoring and bounties: why the disconnect?
Proceedings of the 2nd International Workshop on Software Analytics, 2016

The impact of cross-platform development approaches for mobile applications from the user's perspective.
Proceedings of the International Workshop on App Market Analytics, 2016

Examining the relationship between security metrics and user ratings of mobile apps: a case study.
Proceedings of the International Workshop on App Market Analytics, 2016

Beyond the Attack Surface: Assessing Security Risk with Random Walks on Call Graphs.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016

Actionable metrics are better metrics.
Proceedings of the Perspectives on Data Science for Software Engineering, 2016

Security cannot be measured.
Proceedings of the Perspectives on Data Science for Software Engineering, 2016

2015
Do Bugs Foreshadow Vulnerabilities? A Study of the Chromium Project.
Proceedings of the 12th IEEE/ACM Working Conference on Mining Software Repositories, 2015

An insider threat activity in a software security course.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

Analyzing Security Data.
Proceedings of the Art and Science of Analyzing Software Data, 2015

2014
An empirical investigation of socio-technical code review metrics and security vulnerabilities.
Proceedings of the 6th International Workshop on Social Software Engineering, 2014

2013
Vulnerability of the day: concrete demonstrations for software engineering undergraduates.
Proceedings of the 35th International Conference on Software Engineering, 2013

Teaching Web Engineering using a project component.
Proceedings of the IEEE Frontiers in Education Conference, 2013

When a Patch Goes Bad: Exploring the Properties of Vulnerability-Contributing Commits.
Proceedings of the 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2013

2012
Validating software metrics: A spectrum of philosophies.
ACM Trans. Softw. Eng. Methodol., 2012

Interactive churn metrics: socio-technical variants of code churn.
ACM SIGSOFT Softw. Eng. Notes, 2012

2011
Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities.
IEEE Trans. Software Eng., 2011

Does adding manpower also affect quality?: an empirical, longitudinal analysis.
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

Socio-technical developer networks: should we trust our measurements?
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
Protection Poker: The New Software Security "Game";.
IEEE Secur. Priv., 2010

On the Use of Issue Tracking Annotations for Improving Developer Activity Metrics.
Adv. Softw. Eng., 2010

Improving developer activity metrics with issue tracking annotations.
Proceedings of the 2010 ICSE Workshop on Emerging Trends in Software Metrics, 2010

Strengthening the empirical analysis of the relationship between Linus' Law and software security.
Proceedings of the International Symposium on Empirical Software Engineering and Measurement, 2010

2009
On preparing students for distributed software development with a synchronous, collaborative development platform.
Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, 2009

Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer.
Proceedings of the Engineering Secure Software and Systems, 2009

Secure open source collaboration: an empirical study of linus' law.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Predicting failures with developer networks and social network analysis.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

ROSE: a repository of education-friendly open-source projects.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008

2006
Fifteen compilers in fifteen days.
Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, 2006


  Loading...