Search Results - "Croft, Roland"

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review by Croft, Roland, Xie, Yongzheng, Babar, Muhammad Ali

    Published in IEEE transactions on software engineering (01-03-2023)
    “…Software Vulnerability Prediction (SVP) is a data-driven technique for software quality assurance that has recently gained considerable attention in the…”
    Get full text
    Journal Article
  2. 2

    SmartValidator: A framework for automatic identification and classification of cyber threat data by Islam, Chadni, Babar, M. Ali, Croft, Roland, Janicke, Helge

    “…A wide variety of Cyber Threat Information (CTI) is used by Security Operation Centres (SOCs) to perform validation of security incidents and alerts. Security…”
    Get full text
    Journal Article
  3. 3

    An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources by Croft, Roland, Babar, M. Ali, Li, Li

    “…Software Vulnerability (SV) severity assessment is a vital task for informing SV remediation and triage. Ranking of SV severity scores is often used to advise…”
    Get full text
    Conference Proceeding
  4. 4

    Data Quality for Software Vulnerability Datasets by Croft, Roland, Babar, M. Ali, Kholoosi, M. Mehdi

    “…The use of learning-based techniques to achieve automated software vulnerability detection has been of longstanding interest within the software security…”
    Get full text
    Conference Proceeding
  5. 5

    DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning by Minh Le, Triet Huynh, Hin, David, Croft, Roland, Ali Babar, M.

    “…It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there…”
    Get full text
    Conference Proceeding
  6. 6

    An empirical study of developers’ discussions about security challenges of different programming languages by Croft, Roland, Xie, Yongzheng, Zahedi, Mansooreh, Babar, M. Ali, Treude, Christoph

    “…Given programming languages can provide different types and levels of security support, it is critically important to consider security aspects while selecting…”
    Get full text
    Journal Article
  7. 7

    Noisy Label Learning for Security Defects by Croft, Roland, Babar, M. Ali, Chen, Huaming

    “…Data-driven software engineering processes, such as vulnerability prediction heavily rely on the quality of the data used. In this paper, we observe that it is…”
    Get full text
    Conference Proceeding
  8. 8

    Data Quality for Software Vulnerability Datasets by Croft, Roland, Babar, M. Ali, Kholoosi, Mehdi

    Published 13-01-2023
    “…The use of learning-based techniques to achieve automated software vulnerability detection has been of longstanding interest within the software security…”
    Get full text
    Journal Article
  9. 9

    A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality by Kholoosi, M. Mehdi, Babar, M. Ali, Croft, Roland

    Published 01-08-2024
    “…Artificial Intelligence (AI) advancements have enabled the development of Large Language Models (LLMs) that can perform a variety of tasks with remarkable…”
    Get full text
    Journal Article
  10. 10

    Noisy Label Learning for Security Defects by Croft, Roland, Babar, M. Ali, Chen, Huaming

    Published 08-03-2022
    “…Data-driven software engineering processes, such as vulnerability prediction heavily rely on the quality of the data used. In this paper, we observe that it is…”
    Get full text
    Journal Article
  11. 11

    An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources by Croft, Roland, Babar, M. Ali, Li, Li

    Published 20-12-2021
    “…Software Vulnerability (SV) severity assessment is a vital task for informing SV remediation and triage. Ranking of SV severity scores is often used to advise…”
    Get full text
    Journal Article
  12. 12

    Data Preparation for Software Vulnerability Prediction: A Systematic Literature Review by Croft, Roland, Xie, Yongzheng, Babar, M. Ali

    Published 13-09-2021
    “…Software Vulnerability Prediction (SVP) is a data-driven technique for software quality assurance that has recently gained considerable attention in the…”
    Get full text
    Journal Article
  13. 13

    SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data by Islam, Chadni, Babar, M. Ali, Croft, Roland, Janicke, Helge

    Published 14-03-2022
    “…A wide variety of Cyber Threat Information (CTI) is used by Security Operation Centres (SOCs) to perform validation of security incidents and alerts. Security…”
    Get full text
    Journal Article
  14. 14

    PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning by Minh Le, Triet Huynh, Hin, David, Croft, Roland, Babar, M. Ali

    “…Security is an increasing concern in software development. Developer Question and Answer (Q&A) websites provide a large amount of security discussion. Existing…”
    Get full text
    Conference Proceeding
  15. 15

    An Empirical Study of Rule-Based and Learning-Based Approaches for Static Application Security Testing by Croft, Roland, Newlands, Dominic, Chen, Ziyu, Babar, M. Ali

    Published 05-07-2021
    “…Background: Static Application Security Testing (SAST) tools purport to assist developers in detecting security issues in source code. These tools typically…”
    Get full text
    Journal Article
  16. 16

    DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning by Le, Triet H. M, Hin, David, Croft, Roland, Babar, M. Ali

    Published 18-08-2021
    “…It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there…”
    Get full text
    Journal Article
  17. 17

    An Empirical Study of Developers' Discussions about Security Challenges of Different Programming Languages by Croft, Roland, Xie, Yongzheng, Zahedi, Mansooreh, Babar, M. Ali, Treude, Christoph

    Published 28-07-2021
    “…Given programming languages can provide different types and levels of security support, it is critically important to consider security aspects while selecting…”
    Get full text
    Journal Article
  18. 18

    A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites by Le, Triet H. M, Croft, Roland, Hin, David, Babar, M. Ali

    Published 21-04-2021
    “…Context: Security Vulnerabilities (SVs) pose many serious threats to software systems. Developers usually seek solutions to addressing these SVs on developer…”
    Get full text
    Journal Article
  19. 19

    PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning by Le, Triet H. M, Hin, David, Croft, Roland, Babar, M. Ali

    Published 08-03-2020
    “…Security is an increasing concern in software development. Developer Question and Answer (Q&A) websites provide a large amount of security discussion. Existing…”
    Get full text
    Journal Article