Ferreyra, Nicolas E. Diaz
23  results:
Search for persons X
?
1

CATMA: Conformance Analysis Tool For Microservice Applicati..:

, In: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings,
 
?
2

Developers Need Protection, Too: Perspectives and Research ..:

, In: 2023 IEEE/ACM 16th International Conference on Cooperative and Human Aspects of Software Engineering (CHASE),
 
?
3

LLMSecEval: A Dataset of Natural Language Prompts for Secur..:

, In: 2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR),
 
?
4

Vul4J: A Dataset of Reproducible Java Vulnerabilities Geare..:

, In: 2022 IEEE/ACM 19th International Conference on Mining Software Repositories (MSR),
 
?
5

Meeting Strangers Online: Feature Models for Trustworthines..:

, In: Human-Centered Software Engineering; Lecture Notes in Computer Science,
 
?
6

Vul4J : a dataset of reproducible Java vulnerabilities g..:

, In: Proceedings of the 19th International Conference on Mining Software Repositories,
 
?
7

PDP-ReqLite: A Lightweight Approach for the Elicitation of ..:

, In: Lecture Notes in Computer Science; Data Privacy Management, Cryptocurrencies and Blockchain Technology,
 
?
8

CATMA: Conformance Analysis Tool For Microservice Applicati..:

, In: 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion),
 
?
9

Conversational DevBots for Secure Programming: An Empirical..:

, In: The International Conference on Evaluation and Assessment in Software Engineering 2022,
 
?
10

GitHub Considered Harmful? Analyzing Open-Source Projects f..:

, In: 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS),
 
?
11

SoK: Security of Microservice Applications: A Practitioners..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
12

ENAGRAM: An App to Evaluate Preventative Nudges for Instagr..:

, In: Proceedings of the 2022 European Symposium on Usable Security,
 
?
13

Towards a Security Benchmark for the Architectural Design o..:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
14

STRIPED: A Threat Analysis Method for IoT Systems:

, In: Proceedings of the 17th International Conference on Availability, Reliability and Security,
 
?
15

Access-Control Prediction in Social Network Sites: Examinin..:

, In: Lecture Notes in Computer Science; Social Informatics,
 
1-15