Nuthan Munaiah
Nuthan Munaiah
Verified email at g.rit.edu - Homepage
Title
Cited by
Cited by
Year
Curating GitHub for Engineered Software Projects
N Munaiah, S Kroh, C Cabrey, M Nagappan
Empirical Software Engineering 22 (6), 3219–3253, 2017
1132017
The impact of cross-platform development approaches for mobile applications from the user's perspective
IT Mercado, N Munaiah, A Meneely
Proceedings of the International Workshop on App Market Analytics, 43-49, 2016
302016
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project
N Munaiah, F Camilo, W Wigham, A Meneely, M Nagappan
Empirical Software Engineering 22 (3), 1305-1347, 2017
202017
Vulnerability severity scoring and bounties: Why the disconnect?
N Munaiah, A Meneely
Proceedings of the 2nd International Workshop on Software Analytics, 8-14, 2016
202016
A domain-independent model for identifying security requirements
N Munaiah, A Meneely, PK Murukannaiah
2017 IEEE 25th International Requirements Engineering Conference (RE), 506-511, 2017
142017
Who added that permission to my app? an analysis of developer permission changes in open source android apps
DE Krutz, N Munaiah, A Peruma, MW Mkaouer
2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017
92017
Are intrusion detection studies evaluated consistently? a systematic literature review
N Munaiah, A Meneely, R Wilson, B Short
92016
Attack surface definitions: A systematic literature review
C Theisen, N Munaiah, M Al-Zyoud, JC Carver, A Meneely, L Williams
Information and Software Technology 104, 94-103, 2018
82018
Darwin: a static analysis dataset of malicious and benign android apps
N Munaiah, C Klimkowsky, S McRae, A Blaine, SA Malachowsky, C Perez, ...
Proceedings of the International Workshop on App Market Analytics, 26-29, 2016
82016
Beyond the attack surface: Assessing security risk with random walks on call graphs
N Munaiah, A Meneely
Proceedings of the 2016 ACM Workshop on Software PROtection, 3-14, 2016
82016
Natural language insights from code reviews that missed a vulnerability
N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ...
International Symposium on Engineering Secure Software and Systems, 70-86, 2017
72017
Examining the relationship between security metrics and user ratings of mobile apps: a case study
DE Krutz, N Munaiah, A Meneely, SA Malachowsky
Proceedings of the International Workshop on App Market Analytics, 8-14, 2016
72016
Data-driven insights from vulnerability discovery metrics
N Munaiah, A Meneely
2019 IEEE/ACM Joint 4th International Workshop on Rapid Continuous Software …, 2019
32019
A dataset for identifying actionable feedback in collaborative software development
BS Meyers, N Munaiah, E Prud’hommeaux, A Meneely, J Wolff, CO Alm, ...
Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018
32018
Assisted discovery of software vulnerabilities
N Munaiah
Proceedings of the 40th International Conference on Software Engineering …, 2018
32018
A Cybersecurity Dataset Derived from the National Collegiate Penetration Testing Competition
N Munaiah, J Pelletier, SH Su, SJ Yang, A Meneely
HICSS Symposium on Cybersecurity Big Data Analytics, 2019
12019
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition
N Munaiah, A Rahman, J Pelletier, L Williams, A Meneely
2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019
12019
Systematization of Vulnerability Discovery Knowledge: Review Protocol
N Munaiah, A Meneely
arXiv preprint arXiv:1902.03331, 2019
12019
Toward Data-Driven Discovery of Software Vulnerabilities
N Munaiah
2020
Continuous Data-driven Software Engineering-Towards a Research Agenda: Report on the Joint 5th International Workshop on Rapid Continuous Software Engineering (RCoSE 2019) and …
I Gerostathopoulos, M Konersmann, S Krusche, DI Mattos, J Bosch, ...
ACM SIGSOFT Software Engineering Notes 44 (3), 60-64, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20