Sfoglia per Rivista EMPIRICAL SOFTWARE ENGINEERING
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques
2014-01-01 Ceccato, Mariano; Massimiliano Di, Penta; Paolo, Falcarin; Filippo, Ricca; Marco, Torchiano; Tonella, Paolo
Analysing app reviews for software engineering: a systematic literature review
2022-01-01 Dąbrowski, Jacek; Letier, Emmanuel; Perini, Anna; Susi, Angelo
An automatic method for assessing the versions affected by a vulnerability
2015-01-01 Nguyen, Viet Hung; Dashevskyi, Stanislav; Massacci, Fabio
Empirical studies in reverse engineering: state of the art and future trends
2007-01-01 Tonella, Paolo; Marco, Torchiano; Bart Du, Bois; Tarja, Systa
Foreword to the special issue on empirical research in requirements engineering
2018-01-01 Gruenbacher, Paul; Perini, Anna
Generating valid grammar-based test inputs by means of genetic programming and annotated grammars
2017-01-01 Kifetew, Fitsum Meshesha; Tiella, Roberto; Tonella, Paolo
Labeling source code with information retrieval methods: an empirical study
2013-01-01 Andrea De, Lucia; Massimiliano Di, Penta; Rocco, Oliveto; Panichella, Annibale; Sebastiano, Panichella
A large study on the effect of code obfuscation on the quality of java code
2015-01-01 Ceccato, Mariano; Capiluppi, Andrea; Falcarin, Paolo; Boldyreff, Cornelia
Security analysis of permission re-delegation vulnerabilities in Android apps
2020-01-01 Demissie, Biniam Fisseha; Ceccato, Mariano; Shar, Lwin Khin
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge
2019-01-01 Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn
Using search-based algorithms for Ajax event sequence generation during testing
2011-01-01 Marchetto, Alessandro; Tonella, Paolo
Weighing lexical information for software clustering in the context of architecture recovery
2016-01-01 Anna, Corazza; Sergio Di, Martino; Maggio, Valerio; Giuseppe, Scanniello
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques | 1-gen-2014 | Ceccato, Mariano; Massimiliano Di, Penta; Paolo, Falcarin; Filippo, Ricca; Marco, Torchiano; Tonella, Paolo | |
Analysing app reviews for software engineering: a systematic literature review | 1-gen-2022 | Dąbrowski, Jacek; Letier, Emmanuel; Perini, Anna; Susi, Angelo | |
An automatic method for assessing the versions affected by a vulnerability | 1-gen-2015 | Nguyen, Viet Hung; Dashevskyi, Stanislav; Massacci, Fabio | |
Empirical studies in reverse engineering: state of the art and future trends | 1-gen-2007 | Tonella, Paolo; Marco, Torchiano; Bart Du, Bois; Tarja, Systa | |
Foreword to the special issue on empirical research in requirements engineering | 1-gen-2018 | Gruenbacher, Paul; Perini, Anna | |
Generating valid grammar-based test inputs by means of genetic programming and annotated grammars | 1-gen-2017 | Kifetew, Fitsum Meshesha; Tiella, Roberto; Tonella, Paolo | |
Labeling source code with information retrieval methods: an empirical study | 1-gen-2013 | Andrea De, Lucia; Massimiliano Di, Penta; Rocco, Oliveto; Panichella, Annibale; Sebastiano, Panichella | |
A large study on the effect of code obfuscation on the quality of java code | 1-gen-2015 | Ceccato, Mariano; Capiluppi, Andrea; Falcarin, Paolo; Boldyreff, Cornelia | |
Security analysis of permission re-delegation vulnerabilities in Android apps | 1-gen-2020 | Demissie, Biniam Fisseha; Ceccato, Mariano; Shar, Lwin Khin | |
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge | 1-gen-2019 | Ceccato, Mariano; Tonella, Paolo; Basile, Cataldo; Falcarin, Paolo; Torchiano, Marco; Coppens, Bart; De Sutter, Bjorn | |
Using search-based algorithms for Ajax event sequence generation during testing | 1-gen-2011 | Marchetto, Alessandro; Tonella, Paolo | |
Weighing lexical information for software clustering in the context of architecture recovery | 1-gen-2016 | Anna, Corazza; Sergio Di, Martino; Maggio, Valerio; Giuseppe, Scanniello |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile