Andy Meneely
Title
Cited by
Cited by
Year
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
Y Shin, A Meneely, L Williams, JA Osborne
IEEE transactions on software engineering 37 (6), 772-787, 2010
4112010
Predicting failures with developer networks and social network analysis
A Meneely, L Williams, W Snipes, J Osborne
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations …, 2008
2572008
Secure open source collaboration: an empirical study of linus' law
A Meneely, L Williams
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1282009
Validating software metrics: A spectrum of philosophies
A Meneely, B Smith, L Williams
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (4), 1-28, 2013
912013
Socio-technical developer networks: Should we trust our measurements?
A Meneely, L Williams
Proceedings of the 33rd International Conference on Software Engineering …, 2011
712011
Protection poker: The new software security" game"
L Williams, A Meneely, G Shipley
IEEE Security & Privacy 8 (3), 14-20, 2010
642010
When a patch goes bad: Exploring the properties of vulnerability-contributing commits
A Meneely, H Srinivasan, A Musa, AR Tejeda, M Mokary, B Spates
2013 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2013
522013
An empirical investigation of socio-technical code review metrics and security vulnerabilities
A Meneely, ACR Tejeda, B Spates, S Trudeau, D Neuberger, K Whitlock, ...
Proceedings of the 6th International Workshop on Social Software Engineering …, 2014
462014
Appendix B: iTrust electronic health care system case study
A Meneely, B Smith, L Williams
Software and Systems Traceability, 425, 2012
422012
Strengthening the empirical analysis of the relationship between Linus' Law and software security
A Meneely, L Williams
Proceedings of the 2010 ACM-IEEE International Symposium on Empirical …, 2010
422010
Do bugs foreshadow vulnerabilities? a study of the chromium project
F Camilo, A Meneely, M Nagappan
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 269-279, 2015
402015
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected
B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams
Proceedings of the second annual workshop on Security and privacy in medical …, 2010
402010
The impact of cross-platform development approaches for mobile applications from the user's perspective
IT Mercado, N Munaiah, A Meneely
Proceedings of the International Workshop on App Market Analytics, 43-49, 2016
362016
On preparing students for distributed software development with a synchronous, collaborative development platform
A Meneely, L Williams
Proceedings of the 40th ACM technical symposium on Computer science …, 2009
342009
ROSE: a repository of education-friendly open-source projects
A Meneely, L Williams, EF Gehringer
Proceedings of the 13th annual conference on Innovation and technology in …, 2008
322008
Improving developer activity metrics with issue tracking annotations
A Meneely, M Corcoran, L Williams
Proceedings of the 2010 ICSE Workshop on Emerging Trends in Software Metrics …, 2010
272010
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project
N Munaiah, F Camilo, W Wigham, A Meneely, M Nagappan
Empirical Software Engineering 22 (3), 1305-1347, 2017
242017
Protection poker: Structuring software security risk assessment and knowledge transfer
L Williams, M Gegick, A Meneely
International Symposium on Engineering Secure Software and Systems, 122-134, 2009
242009
Vulnerability severity scoring and bounties: Why the disconnect?
N Munaiah, A Meneely
Proceedings of the 2nd International Workshop on Software Analytics, 8-14, 2016
212016
Jazz Sangam: A real-time tool for distributed pair programming on a team development platform
JVS Devide, A Meneely, CW Ho, L Williams, M Devetsikiotis
Workshop on Infrastructure for Research in Collaborative Software …, 2008
202008
The system can't perform the operation now. Try again later.
Articles 1–20