A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements M Deng, K Wuyts, R Scandariato, B Preneel, W Joosen Requirements Engineering 16 (1), 3-32, 2011 | 631 | 2011 |
Predicting vulnerable software components via text mining R Scandariato, J Walden, A Hovsepyan, W Joosen IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014 | 406 | 2014 |
Predicting vulnerable components: Software metrics vs text mining J Walden, J Stuckman, R Scandariato 2014 IEEE 25th international symposium on software reliability engineering …, 2014 | 260 | 2014 |
A descriptive study of Microsoft’s threat modeling technique R Scandariato, K Wuyts, W Joosen Requirements Engineering 20, 163-180, 2015 | 187 | 2015 |
On the secure software development process: CLASP, SDL and Touchpoints compared B De Win, R Scandariato, K Buyens, J Grégoire, W Joosen Information and software technology 51 (7), 1152-1171, 2009 | 173 | 2009 |
Software vulnerability prediction using text analysis techniques A Hovsepyan, R Scandariato, W Joosen, J Walden status: accepted, 2012 | 139 | 2012 |
Threat analysis of software systems: A systematic literature review K Tuma, G Calikli, R Scandariato Journal of Systems and Software 144, 275-294, 2018 | 131 | 2018 |
An analysis of the security patterns landscape T Heyman, K Yskout, R Scandariato, W Joosen Third International Workshop on Software Engineering for Secure Systems …, 2007 | 110 | 2007 |
Empirical evaluation of a privacy-focused threat modeling methodology K Wuyts, R Scandariato, W Joosen Journal of Systems and Software 96, 122-138, 2014 | 82 | 2014 |
Using security patterns to combine security metrics T Heyman, R Scandariato, C Huygens, W Joosen 2008 Third International Conference on Availability, Reliability and …, 2008 | 82 | 2008 |
On the secure software development process: CLASP and SDL compared J Gregoire, K Buyens, B De Win, R Scandariato, W Joosen Third International Workshop on Software Engineering for Secure Systems …, 2007 | 81 | 2007 |
Do security patterns really help designers? K Yskout, R Scandariato, W Joosen 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015 | 76 | 2015 |
Current and future bots in software development L Erlenhov, FG de Oliveira Neto, R Scandariato, P Leitner 2019 IEEE/ACM 1st International Workshop on Bots in Software Engineering …, 2019 | 73 | 2019 |
Maintainability prediction: A regression analysis of measures of evolving systems JH Hayes, L Zhao 21st IEEE International Conference on Software Maintenance (ICSM'05), 601-604, 2005 | 71 | 2005 |
The effect of dimensionality reduction on software vulnerability prediction models J Stuckman, J Walden, R Scandariato IEEE Transactions on Reliability 66 (1), 17-37, 2016 | 68 | 2016 |
Design notations for secure software: a systematic literature review A Van den Berghe, R Scandariato, K Yskout, W Joosen Software & Systems Modeling 16, 809-831, 2017 | 62 | 2017 |
Static analysis versus penetration testing: A controlled experiment R Scandariato, J Walden, W Joosen 2013 IEEE 24th international symposium on software reliability engineering …, 2013 | 60 | 2013 |
Predicting Vulnerable Classes in an Android Application R Scandariato, J Walden status: published, 1-6, 2012 | 49 | 2012 |
A system of security patterns K Yskout, T Heyman, R Scandariato, W Joosen CW Reports, 2006 | 47 | 2006 |
A privacy-aware conceptual model for handling personal data T Antignac, R Scandariato, G Schneider Leveraging Applications of Formal Methods, Verification and Validation …, 2016 | 46 | 2016 |