Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities Y Shin, A Meneely, L Williams, JA Osborne IEEE transactions on software engineering 37 (6), 772-787, 2010 | 775 | 2010 |
Predicting failures with developer networks and social network analysis A Meneely, L Williams, W Snipes, J Osborne Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations …, 2008 | 348 | 2008 |
Secure open source collaboration: an empirical study of linus' law A Meneely, L Williams Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 181 | 2009 |
Validating software metrics: A spectrum of philosophies A Meneely, B Smith, L Williams ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (4), 1-28, 2013 | 136 | 2013 |
Socio-technical developer networks: Should we trust our measurements? A Meneely, L Williams Proceedings of the 33rd international conference on software engineering …, 2011 | 122 | 2011 |
When a patch goes bad: Exploring the properties of vulnerability-contributing commits A Meneely, H Srinivasan, A Musa, AR Tejeda, M Mokary, B Spates 2013 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2013 | 118 | 2013 |
Protection poker: The new software security" game" L Williams, A Meneely, G Shipley IEEE Security & Privacy 8 (3), 14-20, 2010 | 99 | 2010 |
Do bugs foreshadow vulnerabilities? a study of the chromium project F Camilo, A Meneely, M Nagappan 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 269-279, 2015 | 91 | 2015 |
An empirical investigation of socio-technical code review metrics and security vulnerabilities A Meneely, ACR Tejeda, B Spates, S Trudeau, D Neuberger, K Whitlock, ... Proceedings of the 6th International Workshop on Social Software Engineering …, 2014 | 79 | 2014 |
Appendix B: iTrust electronic health care system case study A Meneely, B Smith, L Williams Software and Systems Traceability 425, 2012 | 77 | 2012 |
Strengthening the empirical analysis of the relationship between Linus' Law and software security A Meneely, L Williams Proceedings of the 2010 ACM-IEEE international symposium on empirical …, 2010 | 75 | 2010 |
Attack surface definitions: A systematic literature review C Theisen, N Munaiah, M Al-Zyoud, JC Carver, A Meneely, L Williams Information and Software Technology 104, 94-103, 2018 | 71 | 2018 |
The impact of cross-platform development approaches for mobile applications from the user's perspective IT Mercado, N Munaiah, A Meneely Proceedings of the International Workshop on App Market Analytics, 43-49, 2016 | 67 | 2016 |
Vulnerability severity scoring and bounties: Why the disconnect? N Munaiah, A Meneely Proceedings of the 2nd International Workshop on Software Analytics, 8-14, 2016 | 52 | 2016 |
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams Proceedings of the second annual workshop on Security and privacy in medical …, 2010 | 49 | 2010 |
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project N Munaiah, F Camilo, W Wigham, A Meneely, M Nagappan Empirical Software Engineering 22, 1305-1347, 2017 | 46 | 2017 |
Characterizing attacker behavior in a cybersecurity penetration testing competition N Munaiah, A Rahman, J Pelletier, L Williams, A Meneely 2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019 | 45 | 2019 |
Improving developer activity metrics with issue tracking annotations A Meneely, M Corcoran, L Williams Proceedings of the 2010 ICSE Workshop on Emerging Trends in Software Metrics …, 2010 | 41 | 2010 |
On preparing students for distributed software development with a synchronous, collaborative development platform A Meneely, L Williams Proceedings of the 40th ACM technical symposium on Computer science …, 2009 | 40 | 2009 |
ROSE: a repository of education-friendly open-source projects A Meneely, L Williams, EF Gehringer Proceedings of the 13th annual conference on Innovation and technology in …, 2008 | 35 | 2008 |