Author of the publication

APR4Vul: an empirical study of automatic program repair techniques on real-world Java vulnerabilities.

, , , , and . Empir. Softw. Eng., 29 (1): 18 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cross-project Classification of Security-related Requirements., , and . CoRR, (2020)JavaScript Malware Detection Using Locality Sensitive Hashing., , and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 143-154. Springer, (2020)Privacy Compliance Via Model Transformations., , and . EuroS&P Workshops, page 120-126. IEEE, (2018)SecureChange: Security Engineering for Lifelong Evolvable Systems., and . ISoLA (2), volume 6416 of Lecture Notes in Computer Science, page 9-12. Springer, (2010)Checking Security Compliance between Models and Code., , , , and . CoRR, (2021)Developers Need Protection, Too: Perspectives and Research Challenges for Privacy in Social Coding Platforms., , , and . CHASE, page 105-110. IEEE, (2023)CONSERVE: A framework for the selection of techniques for monitoring containers security., , , , , , and . J. Syst. Softw., (2022)Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java., and . J. Syst. Softw., (August 2023)Towards a Security Benchmark for the Architectural Design of Microservice Applications., , , , , and . ARES, page 116:1-116:7. ACM, (2022)STRIPED: A Threat Analysis Method for IoT Systems., , , , , , and . ARES, page 96:1-96:6. ACM, (2022)