Follow
Andy Meneely
Title
Cited by
Cited by
Year
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
Y Shin, A Meneely, L Williams, JA Osborne
IEEE transactions on software engineering 37 (6), 772-787, 2010
6982010
Predicting failures with developer networks and social network analysis
A Meneely, L Williams, W Snipes, J Osborne
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations …, 2008
3322008
Secure open source collaboration: an empirical study of linus' law
A Meneely, L Williams
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1722009
Validating software metrics: A spectrum of philosophies
A Meneely, B Smith, L Williams
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (4), 1-28, 2013
1272013
Socio-technical developer networks: Should we trust our measurements?
A Meneely, L Williams
Proceedings of the 33rd international conference on software engineering …, 2011
1142011
When a patch goes bad: Exploring the properties of vulnerability-contributing commits
A Meneely, H Srinivasan, A Musa, AR Tejeda, M Mokary, B Spates
2013 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2013
1092013
Protection poker: The new software security" game"
L Williams, A Meneely, G Shipley
IEEE Security & Privacy 8 (3), 14-20, 2010
962010
Do bugs foreshadow vulnerabilities? a study of the chromium project
F Camilo, A Meneely, M Nagappan
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 269-279, 2015
842015
An empirical investigation of socio-technical code review metrics and security vulnerabilities
A Meneely, ACR Tejeda, B Spates, S Trudeau, D Neuberger, K Whitlock, ...
Proceedings of the 6th International Workshop on Social Software Engineering …, 2014
732014
Appendix B: iTrust electronic health care system case study
A Meneely, B Smith, L Williams
Software and Systems Traceability, 425, 2012
732012
Strengthening the empirical analysis of the relationship between Linus' Law and software security
A Meneely, L Williams
Proceedings of the 2010 ACM-IEEE international symposium on empirical …, 2010
692010
The impact of cross-platform development approaches for mobile applications from the user's perspective
IT Mercado, N Munaiah, A Meneely
Proceedings of the International Workshop on App Market Analytics, 43-49, 2016
642016
Attack surface definitions: A systematic literature review
C Theisen, N Munaiah, M Al-Zyoud, JC Carver, A Meneely, L Williams
Information and Software Technology 104, 94-103, 2018
602018
Vulnerability severity scoring and bounties: Why the disconnect?
N Munaiah, A Meneely
Proceedings of the 2nd International Workshop on Software Analytics, 8-14, 2016
472016
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected
B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams
Proceedings of the second annual workshop on Security and privacy in medical …, 2010
472010
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project
N Munaiah, F Camilo, W Wigham, A Meneely, M Nagappan
Empirical Software Engineering 22, 1305-1347, 2017
452017
On preparing students for distributed software development with a synchronous, collaborative development platform
A Meneely, L Williams
Proceedings of the 40th ACM technical symposium on Computer science …, 2009
402009
Improving developer activity metrics with issue tracking annotations
A Meneely, M Corcoran, L Williams
Proceedings of the 2010 ICSE Workshop on Emerging Trends in Software Metrics …, 2010
392010
ROSE: a repository of education-friendly open-source projects
A Meneely, L Williams, EF Gehringer
Proceedings of the 13th annual conference on Innovation and technology in …, 2008
352008
Characterizing attacker behavior in a cybersecurity penetration testing competition
N Munaiah, A Rahman, J Pelletier, L Williams, A Meneely
2019 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2019
332019
The system can't perform the operation now. Try again later.
Articles 1–20