How can i improve my app? classifying user reviews for software maintenance and evolution S Panichella, A Di Sorbo, E Guzman, CA Visaggio, G Canfora, HC Gall 2015 IEEE international conference on software maintenance and evolution …, 2015 | 588 | 2015 |
A comparison of static, dynamic, and hybrid analysis for malware detection A Damodaran, FD Troia, CA Visaggio, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 13, 1-12, 2017 | 529 | 2017 |
What would users change in my app? summarizing app reviews for recommending software changes A Di Sorbo, S Panichella, CV Alexandru, J Shimagaki, CA Visaggio, ... Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016 | 334 | 2016 |
A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges A Vacca, A Di Sorbo, CA Visaggio, G Canfora Journal of Systems and Software 174, 110891, 2021 | 233 | 2021 |
Detecting android malware using sequences of system calls G Canfora, E Medvet, F Mercaldo, CA Visaggio Proceedings of the 3rd international workshop on software development …, 2015 | 181 | 2015 |
Effectiveness of opcode ngrams for detection of multi family android malware G Canfora, A De Lorenzo, E Medvet, F Mercaldo, CA Visaggio 2015 10th international conference on availability, reliability and security …, 2015 | 149 | 2015 |
R-PackDroid: API package-based characterization and detection of mobile ransomware D Maiorca, F Mercaldo, G Giacinto, CA Visaggio, F Martinelli Proceedings of the symposium on applied computing, 1718-1723, 2017 | 145 | 2017 |
Ardoc: App reviews development oriented classifier S Panichella, A Di Sorbo, E Guzman, CA Visaggio, G Canfora, HC Gall Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016 | 145 | 2016 |
Ransomware steals your phone. formal methods rescue it F Mercaldo, V Nardone, A Santone, CA Visaggio Formal Techniques for Distributed Objects, Components, and Systems: 36th …, 2016 | 145 | 2016 |
Evaluating advantages of test driven development: a controlled experiment with professionals G Canfora, A Cimitile, F Garcia, M Piattini, CA Visaggio Proceedings of the 2006 ACM/IEEE international symposium on Empirical …, 2006 | 129 | 2006 |
A family of experiments to validate metrics for software process models G Canfora, F García, M Piattini, F Ruiz, CA Visaggio Journal of Systems and Software 77 (2), 113-129, 2005 | 119 | 2005 |
Building measure-based prediction models for UML class diagram maintainability M Genero, E Manso, A Visaggio, G Canfora, M Piattini Empirical Software Engineering 12, 517-549, 2007 | 110 | 2007 |
On the effectiveness of system API-related information for Android ransomware detection M Scalas, D Maiorca, F Mercaldo, CA Visaggio, F Martinelli, G Giacinto Computers & Security 86, 168-182, 2019 | 107 | 2019 |
Surf: Summarizer of user reviews feedback A Di Sorbo, S Panichella, CV Alexandru, CA Visaggio, G Canfora 2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017 | 100 | 2017 |
A classifier of malicious android applications G Canfora, F Mercaldo, CA Visaggio 2013 International Conference on Availability, Reliability and Security, 607-614, 2013 | 100 | 2013 |
Evaluating performances of pair designing in industry G Canfora, A Cimitile, F Garcia, M Piattini, CA Visaggio Journal of Systems and Software 80 (8), 1317-1327, 2007 | 100 | 2007 |
A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications A Ciampa, CA Visaggio, M Di Penta Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 99 | 2010 |
Talos: no more ransomware victims with formal methods A Cimitile, F Mercaldo, V Nardone, A Santone, CA Visaggio International Journal of Information Security 17, 719-738, 2018 | 94 | 2018 |
An hmm and structural entropy based detector for android malware: An empirical study G Canfora, F Mercaldo, CA Visaggio Computers & Security 61, 1-18, 2016 | 89 | 2016 |
Support vector machines and malware detection T Singh, F Di Troia, VA Corrado, TH Austin, M Stamp Journal of Computer Virology and Hacking Techniques 12, 203-212, 2016 | 87 | 2016 |