Michael Gegick

Orcid: 0000-0002-5816-4118

According to our database1, Michael Gegick authored at least 9 papers between 2005 and 2010.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2010
Identifying security bug reports via text mining: An industrial case study.
Proceedings of the 7th International Working Conference on Mining Software Repositories, 2010

2009
Predicting Attack-prone Components.
Proceedings of the Second International Conference on Software Testing Verification and Validation, 2009

Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer.
Proceedings of the Engineering Secure Software and Systems, 2009

Toward Non-security Failures as a Predictor of Security Faults and Failures.
Proceedings of the Engineering Secure Software and Systems, 2009

2008
Failure-prone components are also attack-prone components.
Proceedings of the Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2008

Ranking Attack-Prone Components with a Predictive Model.
Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008), 2008

Prioritizing software security fortification throughcode-level metrics.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
On the design of more secure software-intensive systems by use of attack patterns.
Inf. Softw. Technol., 2007

2005
Matching attack patterns to security vulnerabilities in software-intensive system designs.
ACM SIGSOFT Softw. Eng. Notes, 2005


  Loading...