Nuthan Munaiah

Orcid: 0000-0003-2071-664X

According to our database1, Nuthan Munaiah authored at least 19 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
RepoQuester: A Tool Towards Evaluating GitHub Projects.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2022

2019
Continuous Data-driven Software Engineering - Towards a Research Agenda: Report on the Joint 5th International Workshop on Rapid Continuous Software Engineering (RCoSE 2019) and 1st International Works.
ACM SIGSOFT Softw. Eng. Notes, 2019

Systematization of Vulnerability Discovery Knowledge: Review Protocol.
CoRR, 2019

Data-driven insights from vulnerability discovery metrics.
Proceedings of the Joint 4th International Workshop on Rapid Continuous Software Engineering and 1st International Workshop on Data-Driven Decisions, 2019

Pragmatic characteristics of security conversations: an exploratory linguistic analysis.
Proceedings of the 12th International Workshop on Cooperative and Human Aspects of Software Engineering, 2019

Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

2018
Attack surface definitions: A systematic literature review.
Inf. Softw. Technol., 2018

Assisted discovery of software vulnerabilities.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

A dataset for identifying actionable feedback in collaborative software development.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

2017
Curating GitHub for engineered software projects.
Empir. Softw. Eng., 2017

Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project.
Empir. Softw. Eng., 2017

A Domain-Independent Model for Identifying Security Requirements.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

Who Added That Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps.
Proceedings of the 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems, 2017

Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

2016
Vulnerability severity scoring and bounties: why the disconnect?
Proceedings of the 2nd International Workshop on Software Analytics, 2016

Darwin: a static analysis dataset of malicious and benign Android apps.
Proceedings of the International Workshop on App Market Analytics, 2016

The impact of cross-platform development approaches for mobile applications from the user's perspective.
Proceedings of the International Workshop on App Market Analytics, 2016

Examining the relationship between security metrics and user ratings of mobile apps: a case study.
Proceedings of the International Workshop on App Market Analytics, 2016

Beyond the Attack Surface: Assessing Security Risk with Random Walks on Call Graphs.
Proceedings of the 2016 ACM Workshop on Software PROtection, 2016


  Loading...