default search action
Nuthan Munaiah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j4]Ilias Gerostathopoulos, Marco Konersmann, Stephan Krusche, David Issa Mattos, Jan Bosch, Tomás Bures, Brian Fitzgerald, Michael Goedicke, Henry Muccini, Helena Holmström Olsson, Thomas Brand, Robert Chatley, Nikolaos Diamantopoulos, Arik Friedman, Miguel Jiménez, Jan Ole Johanssen, Putra Manggala, Masumi Koseki, Jorge Melegati, Nuthan Munaiah, Gabriel Tamura, Vasileios Theodorou, Jeffrey Wong, Iris Figalist:
Continuous Data-driven Software Engineering - Towards a Research Agenda: Report on the Joint 5th International Workshop on Rapid Continuous Software Engineering (RCoSE 2019) and 1st International Works. ACM SIGSOFT Softw. Eng. Notes 44(3): 60-64 (2019) - 2018
- [j3]Christopher Theisen, Nuthan Munaiah, Mahran Al-Zyoud, Jeffrey C. Carver, Andrew Meneely, Laurie A. Williams:
Attack surface definitions: A systematic literature review. Inf. Softw. Technol. 104: 94-103 (2018) - 2017
- [j2]Nuthan Munaiah, Felivel Camilo, Wesley Wigham, Andrew Meneely, Meiyappan Nagappan:
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project. Empir. Softw. Eng. 22(3): 1305-1347 (2017) - [j1]Nuthan Munaiah, Steven Kroh, Craig Cabrey, Meiyappan Nagappan:
Curating GitHub for engineered software projects. Empir. Softw. Eng. 22(6): 3219-3253 (2017)
Conference and Workshop Papers
- 2022
- [c14]Kowndinya Boyalakuntla, Meiyappan Nagappan, Sridhar Chimalakonda, Nuthan Munaiah:
RepoQuester: A Tool Towards Evaluating GitHub Projects. ICSME 2022: 509-513 - 2019
- [c13]Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie A. Williams, Andrew Meneely:
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition. ESEM 2019: 1-6 - [c12]Nuthan Munaiah, Andrew Meneely:
Data-driven insights from vulnerability discovery metrics. RCoSE-DDrEE@ICSE 2019: 1-7 - [c11]Benjamin S. Meyers, Nuthan Munaiah, Andrew Meneely, Emily Prud'hommeaux:
Pragmatic characteristics of security conversations: an exploratory linguistic analysis. CHASE@ICSE 2019: 79-82 - 2018
- [c10]Benjamin S. Meyers, Nuthan Munaiah, Emily Prud'hommeaux, Andrew Meneely, Josephine Wolff, Cecilia Ovesdotter Alm, Pradeep K. Murukannaiah:
A dataset for identifying actionable feedback in collaborative software development. ACL (2) 2018: 126-131 - [c9]Nuthan Munaiah:
Assisted discovery of software vulnerabilities. ICSE (Companion Volume) 2018: 464-467 - 2017
- [c8]Nuthan Munaiah, Benjamin S. Meyers, Cecilia Ovesdotter Alm, Andrew Meneely, Pradeep K. Murukannaiah, Emily Prud'hommeaux, Josephine Wolff, Yang Yu:
Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium. ESSoS 2017: 70-86 - [c7]Daniel E. Krutz, Nuthan Munaiah, Anthony Peruma, Mohamed Wiem Mkaouer:
Who Added That Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps. MOBILESoft@ICSE 2017: 165-169 - [c6]Nuthan Munaiah, Andrew Meneely, Pradeep K. Murukannaiah:
A Domain-Independent Model for Identifying Security Requirements. RE 2017: 506-511 - 2016
- [c5]Nuthan Munaiah, Andrew Meneely:
Beyond the Attack Surface: Assessing Security Risk with Random Walks on Call Graphs. SPRO@CCS 2016: 3-14 - [c4]Daniel E. Krutz, Nuthan Munaiah, Andrew Meneely, Samuel A. Malachowsky:
Examining the relationship between security metrics and user ratings of mobile apps: a case study. WAMA@SIGSOFT FSE 2016: 8-14 - [c3]Nuthan Munaiah, Andrew Meneely:
Vulnerability severity scoring and bounties: why the disconnect? SWAN@SIGSOFT FSE 2016: 8-14 - [c2]Nuthan Munaiah, Casey Klimkowsky, Shannon McRae, Adam Blaine, Samuel A. Malachowsky, Cesar Perez, Daniel E. Krutz:
Darwin: a static analysis dataset of malicious and benign Android apps. WAMA@SIGSOFT FSE 2016: 26-29 - [c1]Iván Tactuk Mercado, Nuthan Munaiah, Andrew Meneely:
The impact of cross-platform development approaches for mobile applications from the user's perspective. WAMA@SIGSOFT FSE 2016: 43-49
Informal and Other Publications
- 2019
- [i2]Nuthan Munaiah, Andrew Meneely:
Systematization of Vulnerability Discovery Knowledge: Review Protocol. CoRR abs/1902.03331 (2019) - 2016
- [i1]Nuthan Munaiah, Steven Kroh, Craig Cabrey, Meiyappan Nagappan:
Curating GitHub for engineered software projects. PeerJ Prepr. 4: e2617 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint