Nuthan Munaiah
Nuthan Munaiah
Verified email at - Homepage
Cited by
Cited by
Curating GitHub for Engineered Software Projects
N Munaiah, S Kroh, C Cabrey, M Nagappan
Empirical Software Engineering 22 (6), 3219–3253, 2017
Attack surface definitions: A systematic literature review
C Theisen, N Munaiah, M Al-Zyoud, JC Carver, A Meneely, L Williams
Information and Software Technology 104, 94-103, 2018
The impact of cross-platform development approaches for mobile applications from the user's perspective
IT Mercado, N Munaiah, A Meneely
Proceedings of the International Workshop on App Market Analytics, 43-49, 2016
Vulnerability severity scoring and bounties: Why the disconnect?
N Munaiah, A Meneely
Proceedings of the 2nd International Workshop on Software Analytics, 8-14, 2016
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project
N Munaiah, F Camilo, W Wigham, A Meneely, M Nagappan
Empirical Software Engineering 22, 1305-1347, 2017
Characterizing attacker behavior in a cybersecurity penetration testing competition
N Munaiah, A Rahman, J Pelletier, L Williams, A Meneely
2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019
Beyond the attack surface: Assessing security risk with random walks on call graphs
N Munaiah, A Meneely
Proceedings of the 2016 ACM Workshop on Software PROtection, 3-14, 2016
A domain-independent model for identifying security requirements
N Munaiah, A Meneely, PK Murukannaiah
2017 IEEE 25th International Requirements Engineering Conference (RE), 506-511, 2017
Who added that permission to my app? an analysis of developer permission changes in open source android apps
DE Krutz, N Munaiah, A Peruma, MW Mkaouer
2017 IEEE/ACM 4th International Conference on Mobile Software Engineering …, 2017
Examining the relationship between security metrics and user ratings of mobile apps: A case study
DE Krutz, N Munaiah, A Meneely, SA Malachowsky
Proceedings of the International Workshop on App Market Analytics, 8-14, 2016
Are intrusion detection studies evaluated consistently? a systematic literature review
N Munaiah, A Meneely, R Wilson, B Short
RIT Scholar Works. Sep, 2016
Natural Language Insights from Code Reviews that Missed a Vulnerability: A Large Scale Study of Chromium
N Munaiah, BS Meyers, CO Alm, A Meneely, PK Murukannaiah, ...
Engineering Secure Software and Systems: 9th International Symposium, ESSoS …, 2017
A cybersecurity dataset derived from the national collegiate penetration testing competition
N Munaiah, J Pelletier, SH Su, S Yang, A Meneely
HICSS Symposium on cybersecurity big data analytics, 2019
Darwin: A static analysis dataset of malicious and benign android apps
N Munaiah, C Klimkowsky, S McRae, A Blaine, SA Malachowsky, C Perez, ...
Proceedings of the International Workshop on App Market Analytics, 26-29, 2016
Continuous data-driven software engineering-towards a research agenda: Report on the joint 5th international workshop on rapid continuous software engineering (rcose 2019) and …
I Gerostathopoulos, M Konersmann, S Krusche, DI Mattos, J Bosch, ...
ACM SIGSOFT Software Engineering Notes 44 (3), 60-64, 2019
A dataset for identifying actionable feedback in collaborative software development
BS Meyers, N Munaiah, E Prud’Hommeaux, A Meneely, J Wolff, CO Alm, ...
Proceedings of the 56th Annual Meeting of the Association for Computational …, 2018
Data-driven insights from vulnerability discovery metrics
N Munaiah, A Meneely
2019 IEEE/ACM Joint 4th International Workshop on Rapid Continuous Software …, 2019
Assisted discovery of software vulnerabilities
N Munaiah
Proceedings of the 40th International Conference on Software Engineering …, 2018
Pragmatic characteristics of security conversations: an exploratory linguistic analysis
BS Meyers, N Munaiah, A Meneely, E Prud'hommeaux
2019 IEEE/ACM 12th International Workshop on Cooperative and Human Aspects …, 2019
Systematization of Vulnerability Discovery Knowledge: Review Protocol
N Munaiah, A Meneely
arXiv preprint arXiv:1902.03331, 2019
The system can't perform the operation now. Try again later.
Articles 1–20