Ettore Merlo

Orcid: 0000-0002-1436-6076

According to our database1, Ettore Merlo authored at least 119 papers between 1986 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Unsupervised Graph Neural Networks for Source Code Similarity Detection.
Proceedings of the Discovery Science - 26th International Conference, 2023

2022
How to certify machine learning based safety-critical systems? A systematic literature review.
Autom. Softw. Eng., 2022

Phishing Kits Source Code Similarity Distribution: A Case Study.
Proceedings of the IEEE International Conference on Software Analysis, 2022

Automated extraction and checking of property models from source code for robot swarms.
Proceedings of the 4th International Workshop on Robotics Software Engineering, 2022

Identification of out-of-distribution cases of CNN using class-based surprise adequacy.
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI, 2022

2021
RBAC protection-impacting changes identification: A case study of the security evolution of two PHP applications.
Inf. Softw. Technol., 2021

Models of Computational Profiles to Study the Likelihood of DNN Metamorphic Test Cases.
CoRR, 2021

2020
An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models.
IEEE Trans. Ind. Informatics, 2020

2018
Detection of protection-impacting changes during software evolution.
Proceedings of the 25th International Conference on Software Analysis, 2018

Engineering safety in swarm robotics.
Proceedings of the 1st International Workshop on Robotics Software Engineering, 2018

A DevOps framework for quality-driven self-protection in web software systems.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

Just-in-time detection of protection-impacting changes on WordPress and MediaWiki.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

2017
A case study of TTCN-3 test scripts clone analysis in an industrial telecommunication setting.
Inf. Softw. Technol., 2017

Computing counter-examples for privilege protection losses using security models.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2015
Taint analysis of manual service compositions using Cross-Application Call Graphs.
Proceedings of the 22nd IEEE International Conference on Software Analysis, 2015

Performance impact of lazy deletion in metric trees for incremental clone analysis.
Proceedings of the 9th IEEE International Workshop on Software Clones, 2015

Workshop on the application of security and testing to rich internet applications.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

Evolutionary analysis of access control models: a formal concept analysis method.
Proceedings of 25th Annual International Conference on Computer Science and Software Engineering, 2015

2014
About Metrics for Clone Detection.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2014

Supporting Maintenance and Evolution of Access Control Models in Web Applications.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

2013
Soot class loading in the rootbeer GPU compiler.
Proceedings of the 2nd ACM SIGPLAN International Workshop on State Of the Art in Java Program analysis, 2013

Large scale multi-language clone analysis in a telecommunication industrial setting.
Proceedings of the Proceeding of the 7th International Workshop on Software Clones, 2013

How much really changes? A case study of firefox version evolution using a clone detector.
Proceedings of the Proceeding of the 7th International Workshop on Software Clones, 2013

Semantic smells and errors in access control models: a case study in PHP.
Proceedings of the 35th International Conference on Software Engineering, 2013

Uncovering access control weaknesses and flaws with security-discordant software clones.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection.
Proceedings of the 19th Working Conference on Reverse Engineering, 2012

Fast Detection of Access Control Vulnerabilities in PHP Applications.
Proceedings of the 19th Working Conference on Reverse Engineering, 2012

Targeted genetic test SQL generation for the DB2 database.
Proceedings of the Fifth International Workshop on Testing Database Systems, 2012

Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications.
Proceedings of the 12th IEEE International Working Conference on Source Code Analysis and Manipulation, 2012

An accurate estimation of the Levenshtein distance using metric trees and Manhattan distance.
Proceedings of the Proceeding of the 6th International Workshop on Software Clones, 2012

Adapting software product lines for complex certifiable avionics software.
Proceedings of the Third International Workshop on Product LinE Approaches in Software Engineering, 2012

Locating features in dynamically configured avionics software.
Proceedings of the 34th International Conference on Software Engineering, 2012

Investigation of Access Control Models with Formal Concept Analysis: A Case Study.
Proceedings of the 16th European Conference on Software Maintenance and Reengineering, 2012

2011
Extraction and comprehension of moodle's access control model: A case study.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Automated type-3 clone oracle using levenshtein metric.
Proceedings of the Proceeding of the 5th ICSE International Workshop on Software Clones, 2011

Security Model Evolution of PHP Web Applications.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

2010
Challenging cloning related problems with GPU-based algorithms.
Proceedings of the Proceeding of the 4th ICSE International Workshop on Software Clones, 2010

2009
Computing Structural Types of Clone Syntactic Blocks.
Proceedings of the 16th Working Conference on Reverse Engineering, 2009

Extraction of Inter-procedural Simple Role Privilege Models from PHP Code.
Proceedings of the 16th Working Conference on Reverse Engineering, 2009

2008
Detecting buffer overflow via automatic test input data generation.
Comput. Oper. Res., 2008

2007
Comparison and Evaluation of Clone Detection Tools.
IEEE Trans. Software Eng., 2007

SQL-Injection Security Evolution Analysis in PHP.
Proceedings of the 9th IEEE International Symposium on Web Systems Evolution, 2007

Mining the Lexicon Used by Programmers during Sofware Evolution.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007

Automated Protection of PHP Applications Against SQL-injection Attacks.
Proceedings of the 11th European Conference on Software Maintenance and Reengineering, 2007

2006
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP.
Proceedings of the 13th Working Conference on Reverse Engineering (WCRE 2006), 2006

A Feedback Based Quality Assessment to Support Open Source Software Evolution: the GRASS Case Study.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006

A novel approach to optimize clone refactoring activity.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

06301 Summary -- Duplication, Redundancy, and Similarity in Software.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

06301 Working Session Summary: Presentation and Visualization of Redundant Code.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

Detection of Plagiarism in University Projects Using Metrics-based Spectral Similarity.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

06301 Abstracts Collection -- Duplication, Redundancy, and Similarity in Software.
Proceedings of the Duplication, Redundancy, and Similarity in Software, 23.07., 2006

2005
A language-independent software renovation framework.
J. Syst. Softw., 2005

On feature traceability in object oriented programs.
Proceedings of the 3rd International Workshop on Traceability in Emerging Forms of Software Engineering, 2005

Improving network applications security: a new heuristic to generate stress testing data.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

2004
An Automatic Approach to identify Class Evolution Discontinuities.
Proceedings of the 7th International Workshop on Principles of Software Evolution (IWPSE 2004), 2004

Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses.
Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004), 2004

2003
Feed-forward and recurrent neural networks for source code informal information analysis.
J. Softw. Maintenance Res. Pract., 2003

YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs.
Proceedings of the 11th International Workshop on Program Comprehension (IWPC 2003), 2003

Investigating Java Type Analyses for the Receiver-Classes Testing Criterion.
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels.
Proceedings of the 7th European Conference on Software Maintenance and Reengineering (CSMR 2003), 2003

2002
Recovering Traceability Links between Code and Documentation.
IEEE Trans. Software Eng., 2002

Analyzing cloning evolution in the Linux kernel.
Inf. Softw. Technol., 2002

Knowledge-Based Library Re-Factoring for an Open Source Project.
Proceedings of the 9th Working Conference on Reverse Engineering (WCRE 2002), 28 October, 2002

Investigating Large Software System Evolution: The Linux Kernel.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Predicting Web Site Access: An Application of Time Series.
Proceedings of the 3rd International Workshop on Web Site Evolution (WSE 2001), 2001

Identifying Clones in the Linux Kernel.
Proceedings of the 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 2001

A Method to Re-Organize Legacy Systems via Concept Analysis.
Proceedings of the 9th International Workshop on Program Comprehension (IWPC 2001), 2001

Flow Analysis to Detect Blocked Statements.
Proceedings of the 2001 International Conference on Software Maintenance, 2001

Modeling Clones Evolution through Time Series.
Proceedings of the 2001 International Conference on Software Maintenance, 2001

Modeling Web Maintenance Centers through Queue Models.
Proceedings of the Fifth Conference on Software Maintenance and Reengineering, 2001

2000
Software assessment using metrics: A comparison across large C++ and Java systems.
Ann. Softw. Eng., 2000

Advanced Clone-Analysis to Support Object-Oriented System Refactoring.
Proceedings of the Seventh Working Conference on Reverse Engineering, 2000

Identification of Lower-Level Artifacts.
Proceedings of the 8th International Workshop on Program Comprehension (IWPC 2000), 2000

Tracing Object-Oriented Code into Functional Requirements.
Proceedings of the 8th International Workshop on Program Comprehension (IWPC 2000), 2000

C/C++ Conditional Compilation Analysis using Symbolic Execution.
Proceedings of the 2000 International Conference on Software Maintenance, 2000

1999
Variable-precision reaching definitions analysis.
J. Softw. Maintenance Res. Pract., 1999

ART: an architectural reverse engineering environment.
J. Softw. Maintenance Res. Pract., 1999

Points-to analysis for program understanding.
J. Syst. Softw., 1999

Partial Redesign of Java Software Systems Based on Clone Analysis.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999

Recovering Code to Documentation Links in OO Systems.
Proceedings of the Sixth Working Conference on Reverse Engineering, 1999

Measuring Clone Based Reengineering Opportunities.
Proceedings of the 6th IEEE International Software Metrics Symposium (METRICS 1999), 1999

Extending Software Quality Assessment Techniques to Java Systems.
Proceedings of the 7th International Workshop on Program Comprehension (IWPC '99), May 5-7, 1999, 1999

Parsing C++ Despite Missing Declarations.
Proceedings of the 7th International Workshop on Program Comprehension (IWPC '99), May 5-7, 1999, 1999

Automatic Unit Test Data Generation Using Mixed-Integer Linear Programming and Execution Trees.
Proceedings of the 1999 International Conference on Software Maintenance, 1999

A static measure of a subset of intra-procedural data flow testing coverage based on node coverage.
Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research, 1999

1998
An Analysis Framework for Understanding Layered Software Architectures.
Proceedings of the 6th International Workshop on Program Comprehension (IWPC '98), 1998

Process Assurance Audits: Lessons Learned.
Proceedings of the Forging New Links, 1998

Clones occurence in large object oriented software packages.
Proceedings of the 1998 conference of the Centre for Advanced Studies on Collaborative Research, November 30, 1998

1997
A Reverse Engineering Approach to Evaluate Function Point Rules.
Proceedings of the 4th Working Conference on Reverse Engineering, 1997

Assessing the Benefits of Incorporating Function Clone Detection in a Development Process.
Proceedings of the 1997 International Conference on Software Maintenance (ICSM '97), 1997

Program Understanding and Maintenance with the CANTO Environment.
Proceedings of the 1997 International Conference on Software Maintenance (ICSM '97), 1997

Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing.
Proceedings of the Pulling Together, 1997

Variable Precision Reaching Definitions Analysis for Software Maintenance.
Proceedings of the 1st Euromicro Working Conference on Software Maintenance and Reengineering (CSMR '97), 1997

1996
Pattern Matching for Clone and Concept Detection.
Autom. Softw. Eng., 1996

Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic -A Case Study.
Proceedings of the 3rd Working Conference on Reverse Engineering, 1996

A Cliche-Based Environment to Support Architectural Reverse Engineering.
Proceedings of the 3rd Working Conference on Reverse Engineering, 1996

Inheritance Graph Assessment Using Metrics.
Proceedings of the 3rd IEEE International Software Metrics Symposium (METRICS 1996), 1996

Understanding the architecture of software systems.
Proceedings of the 4th International Workshop on Program Comprehension (WPC '96), 1996

Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics.
Proceedings of the 1996 International Conference on Software Maintenance (ICSM '96), 1996

1995
Reengineering User Interfaces.
IEEE Softw., 1995

Multi-Valued Constant Propagation Analysis for User Interface Reengineering.
Int. J. Softw. Eng. Knowl. Eng., 1995

Pattern Matching for Design Concept Localization.
Proceedings of the 2nd Working Conference on Reverse Engineering, 1995

Application and user interface migration from BASIC to Visual C++.
Proceedings of the International Conference on Software Maintenance, 1995

Using an integrated toolset for program understanding.
Proceedings of the 1995 Conference of the Centre for Advanced Studies on Collaborative Research, 1995

1994
Investigating Reverse Engineering Technologies for the CAS Program Understanding Project.
IBM Syst. J., 1994

Inference of Graphical AUIDL Specifications for the Reverse Engineering of User Interfaces.
Proceedings of the International Conference on Software Maintenance, 1994

Localization of Design Concepts in Legacy Systems.
Proceedings of the International Conference on Software Maintenance, 1994

Towards an integrated toolset for program understanding.
Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31, 1994

1993
Reverse Engineering of User Interfaces.
Proceedings of Working Conference on Reverse Engineering, 1993

A process algebra based program and system representation for reverse engineering.
Proceedings of the IEEE Second Workshop on Program Comprehension, 1993

Source Code Informal Information Analysis Using Connectionist Models.
Proceedings of the 13th International Joint Conference on Artificial Intelligence. Chambéry, France, August 28, 1993

Multi-Valued Constant Propagation for the Reengineering of User Interfaces.
Proceedings of the Conference on Software Maintenance, 1993

The development of a partial design recovery environment for legacy systems.
Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, 1993

1989
Programmable Execution of Multi-Layered Networks for Automatic Speech Recognition.
Commun. ACM, 1989

Speech coding with multilayer networks.
Proceedings of the Neurocomputing - Algorithms, Architectures and Applications, Proceedings of the NATO Advanced Research Workshop on Neurocomputing Algorithms, Architectures and Applications, Les Arcs, France, February 27, 1989

1988
A network of actions for automatic speech recognition.
Speech Commun., 1988

1987
Use of Procedural Knowledge for Automatic Speech Recognition.
Proceedings of the 10th International Joint Conference on Artificial Intelligence. Milan, 1987

1986
A continuous parameter and frequency domain based Markov model.
Proceedings of the IEEE International Conference on Acoustics, 1986


  Loading...