The bugs framework (BF): A structured approach to express bugs I Bojanova, PE Black, Y Yesha, Y Wu 2016 IEEE International Conference on Software Quality, Reliability and …, 2016 | 40 | 2016 |
Using semantic templates to study vulnerabilities recorded in large software repositories Y Wu, RA Gandhi, H Siy Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 38 | 2010 |
Features selection and prediction for IoT attacks J Su, S He, Y Wu High-Confidence Computing 2 (2), 100047, 2022 | 20 | 2022 |
Empirical results on the study of software vulnerabilities (NIER track) Y Wu, H Siy, R Gandhi Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 18 | 2011 |
They know your weaknesses–do you?: Reintroducing common weakness enumeration Y Wu, I Bojanova, Y Yesha CrossTalk 45, 2015 | 11 | 2015 |
An ontology to support empirical studies in software engineering H Siy, Y Wu 2009 International Conference on Computing, Engineering and Information, 12-15, 2009 | 11 | 2009 |
Experience of incorporating NIST standards in a digital forensics curricula S Roy, Y Wu, KN LaVenia 2019 7th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2019 | 9 | 2019 |
Studying software vulnerabilities RA Gandhi, H Siy, Y Wu Crosstalk: The Journal of Defense Software Engineering, 16-20, 2010 | 9 | 2010 |
A Flowchart for Rapid Technical Debt Management Decision Making. C Zhang, Y Wu J. Softw. 11 (2), 212-219, 2016 | 8 | 2016 |
Construction of ontology-based software repositories by text mining Y Wu, H Siy, M Zand, V Winter Computational Science–ICCS 2007: 7th International Conference, Beijing …, 2007 | 8 | 2007 |
Classifying software vulnerabilities by using the bugs framework TM Adhikari, Y Wu 2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020 | 7 | 2020 |
基于分类技术的搜索引擎排名算法——CategoryRank 陈伟柱, 陈英, 吴燕 计算机应用 25 (5), 995-997, 2005 | 7 | 2005 |
Analysis of intrusion detection dataset NSL-KDD using KNIME analytics M Arafat, A Jain, Y Wu International Conference on Cyber Warfare and Security, 573-X, 2018 | 6 | 2018 |
A Review of Deep Learning Techniques Applied in Lung Cancer Diagnosis TM Adhikari, H Liska, Z Sun, Y Wu Signal and Information Processing, Networking and Computers: Proceedings of …, 2020 | 4 | 2020 |
Towards a Periodic Table of Bugs PE Black, I Bojanova, Y Yesha, Y Wu 15th High Confidence Software and Systems Conference (HCSS), 2015 | 4 | 2015 |
Automated Software Testing Starting from Static Analysis: Current State of the Art Y Wu, J Su, DD Moran, CD Near arXiv preprint arXiv:2301.06215, 2023 | 3 | 2023 |
Discovering Meaningful Clusters from Mining the Software Engineering Literature. Y Wu, HP Siy, L Fan SEKE, 613-618, 2008 | 3 | 2008 |
Reconstruction of common weakness enumeration Y Wu, I Bojanova, Y Yesha Sl]: IEEE Software Technology Conference (STC), 28, 2014 | 2 | 2014 |
Using 2-interactive measures in nonlinear classifications Y Wu, Z Wang NAFIPS 2007-2007 Annual Meeting of the North American Fuzzy Information …, 2007 | 2 | 2007 |
Evaluation of the Multifactor Authentication Technique for mobile applications T Zhang, L Yang, Y Wu Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019 | 1 | 2019 |