BibTeX records: Rahul Pandita

download as .bib file

@inproceedings{DBLP:conf/icse/Chattopadhyay0G19,
  author    = {Souti Chattopadhyay and
               Nicholas Nelson and
               Yenifer Ramirez Gonzalez and
               Annel Amelia Leon and
               Rahul Pandita and
               Anita Sarma},
  title     = {Latent patterns in activities: a field study of how developers manage
               context},
  booktitle = {Proceedings of the 41st International Conference on Software Engineering,
               {ICSE} 2019, Montreal, QC, Canada, May 25-31, 2019},
  pages     = {373--383},
  year      = {2019},
  crossref  = {DBLP:conf/icse/2019},
  url       = {https://doi.org/10.1109/ICSE.2019.00051},
  doi       = {10.1109/ICSE.2019.00051},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/Chattopadhyay0G19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/MorrisonPXCW18,
  author    = {Patrick Morrison and
               Rahul Pandita and
               Xusheng Xiao and
               Ram Chillarege and
               Laurie Williams},
  title     = {Are vulnerabilities discovered and resolved like other defects?},
  journal   = {Empirical Software Engineering},
  volume    = {23},
  number    = {3},
  pages     = {1383--1421},
  year      = {2018},
  url       = {https://doi.org/10.1007/s10664-017-9541-1},
  doi       = {10.1007/s10664-017-9541-1},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ese/MorrisonPXCW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/MorrisonMPW18,
  author    = {Patrick Morrison and
               David Moye and
               Rahul Pandita and
               Laurie Williams},
  title     = {Mapping the field of software life cycle security metrics},
  journal   = {Information {\&} Software Technology},
  volume    = {102},
  pages     = {146--159},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.infsof.2018.05.011},
  doi       = {10.1016/j.infsof.2018.05.011},
  timestamp = {Sat, 11 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/infsof/MorrisonMPW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/TelangKVPS18,
  author    = {Pankaj R. Telang and
               Anup K. Kalia and
               Maja Vukovic and
               Rahul Pandita and
               Munindar P. Singh},
  title     = {A Conceptual Framework for Engineering Chatbots},
  journal   = {{IEEE} Internet Computing},
  volume    = {22},
  number    = {6},
  pages     = {54--59},
  year      = {2018},
  url       = {https://doi.org/10.1109/MIC.2018.2877827},
  doi       = {10.1109/MIC.2018.2877827},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/internet/TelangKVPS18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/XieJLWPXX18,
  author    = {Tao Xie and
               He Jiang and
               Ge Li and
               Tianyu Wo and
               Rahul Pandita and
               Chang Xu and
               Lihua Xu},
  title     = {Preface},
  journal   = {J. Comput. Sci. Technol.},
  volume    = {33},
  number    = {5},
  pages     = {873--875},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11390-018-1863-y},
  doi       = {10.1007/s11390-018-1863-y},
  timestamp = {Fri, 14 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcst/XieJLWPXX18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/PanditaBBCR18,
  author    = {Rahul Pandita and
               Steven Bucuvalas and
               Hugolin Bergier and
               Aleksandar Chakarov and
               Elizabeth Richards},
  title     = {Towards {J.A.R.V.I.S.} for Software Engineering: Lessons Learned in
               Implementing a Natural Language Chat Interface},
  booktitle = {The Workshops of the The Thirty-Second {AAAI} Conference on Artificial
               Intelligence, New Orleans, Louisiana, USA, February 2-7, 2018.},
  pages     = {779--782},
  year      = {2018},
  crossref  = {DBLP:conf/aaai/2018w},
  url       = {https://aaai.org/ocs/index.php/WS/AAAIW18/paper/view/16653},
  timestamp = {Wed, 24 Apr 2019 10:44:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aaai/PanditaBBCR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/MorrisonPXCW18,
  author    = {Patrick J. Morrison and
               Rahul Pandita and
               Xusheng Xiao and
               Ram Chillarege and
               Laurie Williams},
  title     = {Are vulnerabilities discovered and resolved like other defects?},
  booktitle = {Proceedings of the 40th International Conference on Software Engineering,
               {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018},
  pages     = {498},
  year      = {2018},
  crossref  = {DBLP:conf/icse/2018},
  url       = {https://doi.org/10.1145/3180155.3182553},
  doi       = {10.1145/3180155.3182553},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/MorrisonPXCW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vl/PanditaPHM18,
  author    = {Rahul Pandita and
               Chris Parnin and
               Felienne Hermans and
               Emerson R. Murphy{-}Hill},
  title     = {No half-measures: {A} study of manual and tool-assisted end-user programming
               tasks in Excel},
  booktitle = {2018 {IEEE} Symposium on Visual Languages and Human-Centric Computing,
               {VL/HCC} 2018, Lisbon, Portugal, October 1-4, 2018},
  pages     = {95--103},
  year      = {2018},
  crossref  = {DBLP:conf/vl/2018},
  url       = {https://doi.org/10.1109/VLHCC.2018.8506540},
  doi       = {10.1109/VLHCC.2018.8506540},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vl/PanditaPHM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/smr/PanditaJSMW17,
  author    = {Rahul Pandita and
               Raoul Jetley and
               Sithu D. Sudarsan and
               Tim Menzies and
               Laurie Williams},
  title     = {{TMAP:} Discovering relevant {API} methods through text mining of
               {API} documentation},
  journal   = {Journal of Software: Evolution and Process},
  volume    = {29},
  number    = {12},
  year      = {2017},
  url       = {https://doi.org/10.1002/smr.1845},
  doi       = {10.1002/smr.1845},
  timestamp = {Thu, 04 Jan 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/smr/PanditaJSMW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/PanditaTWT16,
  author    = {Rahul Pandita and
               Kunal Taneja and
               Laurie Williams and
               Teresa Tung},
  title     = {{ICON:} Inferring Temporal Constraints from Natural Language {API}
               Descriptions},
  booktitle = {2016 {IEEE} International Conference on Software Maintenance and Evolution,
               {ICSME} 2016, Raleigh, NC, USA, October 2-7, 2016},
  pages     = {378--388},
  year      = {2016},
  crossref  = {DBLP:conf/icsm/2016},
  url       = {https://doi.org/10.1109/ICSME.2016.59},
  doi       = {10.1109/ICSME.2016.59},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icsm/PanditaTWT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/JohnsonPSFEMHS16,
  author    = {Brittany Johnson and
               Rahul Pandita and
               Justin Smith and
               Denae Ford and
               Sarah Elder and
               Emerson R. Murphy{-}Hill and
               Sarah Heckman and
               Caitlin Sadowski},
  title     = {A cross-tool communication study on program analysis tool notifications},
  booktitle = {Proceedings of the 24th {ACM} {SIGSOFT} International Symposium on
               Foundations of Software Engineering, {FSE} 2016, Seattle, WA, USA,
               November 13-18, 2016},
  pages     = {73--84},
  year      = {2016},
  crossref  = {DBLP:conf/sigsoft/2016},
  url       = {https://doi.org/10.1145/2950290.2950304},
  doi       = {10.1145/2950290.2950304},
  timestamp = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sigsoft/JohnsonPSFEMHS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/BarikPMM16,
  author    = {Titus Barik and
               Rahul Pandita and
               Justin Middleton and
               Emerson R. Murphy{-}Hill},
  title     = {Designing for dystopia: software engineering research for the post-apocalypse},
  booktitle = {Proceedings of the 24th {ACM} {SIGSOFT} International Symposium on
               Foundations of Software Engineering, {FSE} 2016, Seattle, WA, USA,
               November 13-18, 2016},
  pages     = {924--927},
  year      = {2016},
  crossref  = {DBLP:conf/sigsoft/2016},
  url       = {https://doi.org/10.1145/2950290.2983986},
  doi       = {10.1145/2950290.2983986},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigsoft/BarikPMM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vl/MorrisonPMM16,
  author    = {Patrick Morrison and
               Rahul Pandita and
               Emerson R. Murphy{-}Hill and
               Anne McLaughlin},
  title     = {Veteran developers' contributions and motivations: An open source
               perspective},
  booktitle = {2016 {IEEE} Symposium on Visual Languages and Human-Centric Computing,
               {VL/HCC} 2016, Cambridge, United Kingdom, September 4-8, 2016},
  pages     = {171--179},
  year      = {2016},
  crossref  = {DBLP:conf/vl/2016},
  url       = {https://doi.org/10.1109/VLHCC.2016.7739681},
  doi       = {10.1109/VLHCC.2016.7739681},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vl/MorrisonPMM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/KingPW15,
  author    = {Jason King and
               Rahul Pandita and
               Laurie A. Williams},
  title     = {Enabling forensics by proposing heuristics to identify mandatory log
               events},
  booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
               HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages     = {6:1--6:11},
  year      = {2015},
  crossref  = {DBLP:conf/hotsos/2015},
  url       = {https://doi.org/10.1145/2746194.2746200},
  doi       = {10.1145/2746194.2746200},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotsos/KingPW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scam/PanditaJSW15,
  author    = {Rahul Pandita and
               Raoul Praful Jetley and
               Sithu D. Sudarsan and
               Laurie A. Williams},
  title     = {Discovering likely mappings between APIs using text mining},
  booktitle = {15th {IEEE} International Working Conference on Source Code Analysis
               and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  pages     = {231--240},
  year      = {2015},
  crossref  = {DBLP:conf/scam/2015},
  url       = {https://doi.org/10.1109/SCAM.2015.7335419},
  doi       = {10.1109/SCAM.2015.7335419},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scam/PanditaJSW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/JohnsonPMH15,
  author    = {Brittany Johnson and
               Rahul Pandita and
               Emerson R. Murphy{-}Hill and
               Sarah Heckman},
  title     = {Bespoke tools: adapted to the concepts developers know},
  booktitle = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software
               Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September
               4, 2015},
  pages     = {878--881},
  year      = {2015},
  crossref  = {DBLP:conf/sigsoft/2015},
  url       = {https://doi.org/10.1145/2786805.2803197},
  doi       = {10.1145/2786805.2803197},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigsoft/JohnsonPMH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/YangXPEX14,
  author    = {Wei Yang and
               Xusheng Xiao and
               Rahul Pandita and
               William Enck and
               Tao Xie},
  title     = {Improving mobile application security via bridging user expectations
               and application behaviors},
  booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
               HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages     = {32},
  year      = {2014},
  crossref  = {DBLP:conf/hotsos/2014},
  url       = {https://doi.org/10.1145/2600176.2600208},
  doi       = {10.1145/2600176.2600208},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hotsos/YangXPEX14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PanditaXYEX13,
  author    = {Rahul Pandita and
               Xusheng Xiao and
               Wei Yang and
               William Enck and
               Tao Xie},
  title     = {{WHYPER:} Towards Automating Risk Assessment of Mobile Applications},
  booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
               USA, August 14-16, 2013},
  pages     = {527--542},
  year      = {2013},
  crossref  = {DBLP:conf/uss/2013},
  url       = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/pandita},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/PanditaXYEX13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/PanditaXZXOP12,
  author    = {Rahul Pandita and
               Xusheng Xiao and
               Hao Zhong and
               Tao Xie and
               Stephen Oney and
               Amit M. Paradkar},
  title     = {Inferring method specifications from natural language {API} descriptions},
  booktitle = {34th International Conference on Software Engineering, {ICSE} 2012,
               June 2-9, 2012, Zurich, Switzerland},
  pages     = {815--825},
  year      = {2012},
  crossref  = {DBLP:conf/icse/2012},
  url       = {https://doi.org/10.1109/ICSE.2012.6227137},
  doi       = {10.1109/ICSE.2012.6227137},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/PanditaXZXOP12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsm/PanditaXTH10,
  author    = {Rahul Pandita and
               Tao Xie and
               Nikolai Tillmann and
               Jonathan de Halleux},
  title     = {Guided test generation for coverage criteria},
  booktitle = {26th {IEEE} International Conference on Software Maintenance {(ICSM}
               2010), September 12-18, 2010, Timisoara, Romania},
  pages     = {1--10},
  year      = {2010},
  crossref  = {DBLP:conf/icsm/2010},
  url       = {https://doi.org/10.1109/ICSM.2010.5609565},
  doi       = {10.1109/ICSM.2010.5609565},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icsm/PanditaXTH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2019,
  editor    = {Joanne M. Atlee and
               Tevfik Bultan and
               Jon Whittle},
  title     = {Proceedings of the 41st International Conference on Software Engineering,
               {ICSE} 2019, Montreal, QC, Canada, May 25-31, 2019},
  publisher = {{IEEE} / {ACM}},
  year      = {2019},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8790403/proceeding},
  isbn      = {978-1-7281-0869-8},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2019},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aaai/2018w,
  title     = {The Workshops of the The Thirty-Second {AAAI} Conference on Artificial
               Intelligence, New Orleans, Louisiana, USA, February 2-7, 2018},
  series    = {{AAAI} Workshops},
  volume    = {{WS-18}},
  publisher = {{AAAI} Press},
  year      = {2018},
  url       = {http://www.aaai.org/Library/Workshops/},
  isbn      = {978-1-57735-801-5},
  timestamp = {Wed, 24 Apr 2019 10:44:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aaai/2018w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2018,
  editor    = {Michel Chaudron and
               Ivica Crnkovic and
               Marsha Chechik and
               Mark Harman},
  title     = {Proceedings of the 40th International Conference on Software Engineering,
               {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3180155},
  doi       = {10.1145/3180155},
  isbn      = {978-1-4503-5638-1},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vl/2018,
  editor    = {J{\'{a}}come Cunha and
               Jo{\~{a}}o Paulo Fernandes and
               Caitlin Kelleher and
               Gregor Engels and
               Jorge Mendes},
  title     = {2018 {IEEE} Symposium on Visual Languages and Human-Centric Computing,
               {VL/HCC} 2018, Lisbon, Portugal, October 1-4, 2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8488603/proceeding},
  isbn      = {978-1-5386-4235-1},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vl/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icsm/2016,
  title     = {2016 {IEEE} International Conference on Software Maintenance and Evolution,
               {ICSME} 2016, Raleigh, NC, USA, October 2-7, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7807393/proceeding},
  isbn      = {978-1-5090-3806-0},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icsm/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigsoft/2016,
  editor    = {Thomas Zimmermann and
               Jane Cleland{-}Huang and
               Zhendong Su},
  title     = {Proceedings of the 24th {ACM} {SIGSOFT} International Symposium on
               Foundations of Software Engineering, {FSE} 2016, Seattle, WA, USA,
               November 13-18, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2950290},
  doi       = {10.1145/2950290},
  isbn      = {978-1-4503-4218-6},
  timestamp = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigsoft/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/vl/2016,
  editor    = {Alan F. Blackwell and
               Beryl Plimmer and
               Gem Stapleton},
  title     = {2016 {IEEE} Symposium on Visual Languages and Human-Centric Computing,
               {VL/HCC} 2016, Cambridge, United Kingdom, September 4-8, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7602835/proceeding},
  isbn      = {978-1-5090-0252-8},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/vl/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotsos/2015,
  editor    = {David M. Nicol},
  title     = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
               HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2746194},
  isbn      = {978-1-4503-3376-4},
  timestamp = {Tue, 05 May 2015 15:27:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotsos/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/scam/2015,
  editor    = {Michael W. Godfrey and
               David Lo and
               Foutse Khomh},
  title     = {15th {IEEE} International Working Conference on Source Code Analysis
               and Manipulation, {SCAM} 2015, Bremen, Germany, September 27-28, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7321933/proceeding},
  isbn      = {978-1-4673-7529-0},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/scam/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigsoft/2015,
  editor    = {Elisabetta Di Nitto and
               Mark Harman and
               Patrick Heymans},
  title     = {Proceedings of the 2015 10th Joint Meeting on Foundations of Software
               Engineering, {ESEC/FSE} 2015, Bergamo, Italy, August 30 - September
               4, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2786805},
  doi       = {10.1145/2786805},
  isbn      = {978-1-4503-3675-8},
  timestamp = {Tue, 06 Nov 2018 16:59:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sigsoft/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotsos/2014,
  editor    = {Laurie A. Williams and
               David M. Nicol and
               Munindar P. Singh},
  title     = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
               HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2600176},
  isbn      = {978-1-4503-2907-1},
  timestamp = {Tue, 05 May 2015 15:28:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotsos/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2013,
  editor    = {Samuel T. King},
  title     = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
               USA, August 14-16, 2013},
  publisher = {{USENIX} Association},
  year      = {2013},
  url       = {https://www.usenix.org/conference/usenixsecurity13},
  isbn      = {978-1-931971-03-4},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2012,
  editor    = {Martin Glinz and
               Gail C. Murphy and
               Mauro Pezz{\`{e}}},
  title     = {34th International Conference on Software Engineering, {ICSE} 2012,
               June 2-9, 2012, Zurich, Switzerland},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6218989/proceeding},
  isbn      = {978-1-4673-1067-3},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icsm/2010,
  title     = {26th {IEEE} International Conference on Software Maintenance {(ICSM}
               2010), September 12-18, 2010, Timisoara, Romania},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5604771/proceeding},
  isbn      = {978-1-4244-8630-4},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icsm/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics