Andy Meneely
Title
Cited by
Cited by
Year
Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities
Y Shin, A Meneely, L Williams, JA Osborne
IEEE transactions on software engineering 37 (6), 772-787, 2010
4992010
Predicting failures with developer networks and social network analysis
A Meneely, L Williams, W Snipes, J Osborne
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations …, 2008
2812008
Secure open source collaboration: an empirical study of linus' law
A Meneely, L Williams
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1402009
Validating software metrics: A spectrum of philosophies
A Meneely, B Smith, L Williams
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (4), 1-28, 2013
1012013
Socio-technical developer networks: Should we trust our measurements?
A Meneely, L Williams
Proceedings of the 33rd International Conference on Software Engineering …, 2011
802011
Protection poker: The new software security" game"
L Williams, A Meneely, G Shipley
IEEE Security & Privacy 8 (3), 14-20, 2010
692010
When a patch goes bad: Exploring the properties of vulnerability-contributing commits
A Meneely, H Srinivasan, A Musa, AR Tejeda, M Mokary, B Spates
2013 ACM/IEEE International Symposium on Empirical Software Engineering and …, 2013
662013
An empirical investigation of socio-technical code review metrics and security vulnerabilities
A Meneely, ACR Tejeda, B Spates, S Trudeau, D Neuberger, K Whitlock, ...
Proceedings of the 6th International Workshop on Social Software Engineering …, 2014
562014
Appendix B: iTrust electronic health care system case study
A Meneely, B Smith, L Williams
Software and Systems Traceability, 425, 2012
522012
Do bugs foreshadow vulnerabilities? a study of the chromium project
F Camilo, A Meneely, M Nagappan
2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, 269-279, 2015
502015
Strengthening the empirical analysis of the relationship between Linus' Law and software security
A Meneely, L Williams
Proceedings of the 2010 ACM-IEEE International Symposium on Empirical …, 2010
482010
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected
B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams
Proceedings of the second annual workshop on Security and privacy in medical …, 2010
432010
The impact of cross-platform development approaches for mobile applications from the user's perspective
IT Mercado, N Munaiah, A Meneely
Proceedings of the International Workshop on App Market Analytics, 43-49, 2016
382016
On preparing students for distributed software development with a synchronous, collaborative development platform
A Meneely, L Williams
Proceedings of the 40th ACM technical symposium on Computer science …, 2009
362009
Do bugs foreshadow vulnerabilities? An in-depth study of the chromium project
N Munaiah, F Camilo, W Wigham, A Meneely, M Nagappan
Empirical Software Engineering 22 (3), 1305-1347, 2017
322017
ROSE: a repository of education-friendly open-source projects
A Meneely, L Williams, EF Gehringer
Proceedings of the 13th annual conference on Innovation and technology in …, 2008
322008
Improving developer activity metrics with issue tracking annotations
A Meneely, M Corcoran, L Williams
Proceedings of the 2010 ICSE Workshop on Emerging Trends in Software Metrics …, 2010
282010
Vulnerability severity scoring and bounties: Why the disconnect?
N Munaiah, A Meneely
Proceedings of the 2nd International Workshop on Software Analytics, 8-14, 2016
262016
Protection poker: Structuring software security risk assessment and knowledge transfer
L Williams, M Gegick, A Meneely
International Symposium on Engineering Secure Software and Systems, 122-134, 2009
242009
Interactive churn metrics: socio-technical variants of code churn
A Meneely, O Williams
ACM SIGSOFT Software Engineering Notes 37 (6), 1-6, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20