162 results on '"Sabetta, Antonino"'
Search Results
2. The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application
3. Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers
4. Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories
5. Secure Software Development in the Era of Fluid Multi-party Open Software and Services
6. Code-based Vulnerability Detection in Node.js Applications: How far are we?
7. Commit2Vec: Learning Distributed Representations of Code Changes
8. Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits
9. A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software
10. Vulnerable Open Source Dependencies: Counting Those That Matter
11. A Practical Approach to the Automatic Classification of Security-Relevant Commits
12. Beyond Metadata: Code-centric and Usage-based Analysis of Known Vulnerabilities in Open-source Software
13. TestREx: a Framework for Repeatable Exploits
14. Automated Mapping of Vulnerability Advisories onto their Fix Commits in Open Source Repositories
15. Known Vulnerabilities of Open Source Projects: Where Are the Fixes?
16. The Rocky Road to Sustainable Security
17. Impact assessment for vulnerabilities in open-source software libraries
18. Journey to the Center of Software Supply Chain Attacks
19. Detection, assessment and mitigation of vulnerabilities in open source dependencies
20. Machine-Readable Privacy Certificates for Services
21. Are Machine Learning Models for Malware Detection Ready for Prime Time?
22. Commit2Vec: Learning Distributed Representations of Code Changes
23. TestREx: a framework for repeatable exploits
24. Evaluating Security Through Isolation and Defense in Depth
25. Risk-Based Privacy-Aware Information Disclosure
26. Risk-Aware Information Disclosure
27. A Certification-Aware Service-Oriented Architecture
28. Introduction to the Special Issue on Vulnerabilities
29. A Marketplace for Business Software with Certified Security Properties
30. Verification and Analysis of Autonomic Systems for Networked Enterprises
31. Towards a Trustworthy Service Marketplace for the Future Internet
32. Towards a Model-Driven Infrastructure for Runtime Monitoring
33. “Free” as in Freedom to Protest?
34. On-the-Fly Interoperability through Automated Mediator Synthesis and Monitoring
35. A Framework for Analyzing and Testing the Performance of Software Services
36. Measuring Performance Metrics: Techniques and Tools
37. Performance Metrics in Software Design Models
38. KLAPER: An Intermediate Language for Model-Driven Predictive Analysis of Performance and Reliability
39. A Model Transformation Approach for the Early Performance and Reliability Analysis of Component-Based Systems
40. Abstraction-Raising Transformation for Generating Analysis Models
41. An XML-Based Language to Support Performance and Reliability Modeling and Analysis in Software Architectures
42. Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies
43. A UML Profile to Model Mobile Systems
44. LastPyMile: identifying the discrepancy between sources and packages
45. Trust Me, I’m a Liar.
46. Risk-Aware Information Disclosure
47. The Used, the Bloated, and the Vulnerable: Reducing the Attack Surface of an Industrial Application
48. What Has Artifact Evaluation Ever Done for Us?
49. Toward Automated Exploit Generation for Known Vulnerabilities in Open-Source Libraries
50. Secure Software Development in the Era of Fluid Multi-party Open Software and Services
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.