Author of the publication

Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits.

, , , , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensuring trust in service consumption through security certification., , and . QASBA, page 40-43. ACM, (2011)Commit2Vec: Learning Distributed Representations of Code Changes., , , and . CoRR, (2019)Vulnerable open source dependencies: counting those that matter., , , , and . ESEM, page 42:1-42:10. ACM, (2018)A manually-curated dataset of fixes to vulnerabilities of open-source software., , , , and . MSR, page 383-387. IEEE / ACM, (2019)Commit2Vec: Learning Distributed Representations of Code Changes., , , and . SN Comput. Sci., 2 (3): 150 (2021)Risk-Based Privacy-Aware Information Disclosure., , , and . Int. J. Secur. Softw. Eng., 6 (2): 70-89 (2015)Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers., , , , and . CoRR, (2021)25 Years in Application Security: Looking Back, Looking Forward., , , and . IEEE Secur. Priv., 20 (1): 109-112 (2022)Abstraction-Raising Transformation for Generating Analysis Models., , , and . MoDELS (Satellite Events), volume 3844 of Lecture Notes in Computer Science, page 217-226. Springer, (2005)Towards a Model-Driven Infrastructure for Runtime Monitoring., , , , and . SERENE, volume 6968 of Lecture Notes in Computer Science, page 130-144. Springer, (2011)