{WHYPER}: Towards automating risk assessment of mobile applications R Pandita, X Xiao, W Yang, W Enck, T Xie 22nd USENIX Security Symposium (USENIX Security 13), 527-542, 2013 | 526 | 2013 |
Inferring method specifications from natural language API descriptions R Pandita, X Xiao, H Zhong, T Xie, S Oney, A Paradkar 2012 34th international conference on software engineering (ICSE), 815-825, 2012 | 236 | 2012 |
Mapping the field of software life cycle security metrics P Morrison, D Moye, R Pandita, L Williams Information and Software Technology 102, 146-159, 2018 | 76 | 2018 |
Guided test generation for coverage criteria R Pandita, T Xie, N Tillmann, J De Halleux 2010 IEEE international conference on software maintenance, 1-10, 2010 | 73 | 2010 |
Are vulnerabilities discovered and resolved like other defects? PJ Morrison, R Pandita, X Xiao, R Chillarege, L Williams Proceedings of the 40th International Conference on Software Engineering …, 2018 | 43 | 2018 |
A cross-tool communication study on program analysis tool notifications B Johnson, R Pandita, J Smith, D Ford, S Elder, E Murphy-Hill, ... Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 36 | 2016 |
Discovering likely mappings between APIs using text mining R Pandita, RP Jetley, SD Sudarsan, L Williams 2015 IEEE 15th International Working Conference on Source Code Analysis and …, 2015 | 35 | 2015 |
A conceptual framework for engineering chatbots PR Telang, AK Kalia, M Vukovic, R Pandita, MP Singh IEEE Internet Computing 22 (6), 54-59, 2018 | 32 | 2018 |
A tale from the trenches: cognitive biases and software development S Chattopadhyay, N Nelson, A Au, N Morales, C Sanchez, R Pandita, ... Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 26 | 2020 |
Security misconfigurations in open source kubernetes manifests: An empirical study A Rahman, SI Shamim, DB Bose, R Pandita ACM Transactions on Software Engineering and Methodology 32 (4), 1-36, 2023 | 24 | 2023 |
Latent patterns in activities: A field study of how developers manage context S Chattopadhyay, N Nelson, YR Gonzalez, AA Leon, R Pandita, A Sarma 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 20 | 2019 |
Icon: Inferring temporal constraints from natural language api descriptions R Pandita, K Taneja, L Williams, T Tung 2016 IEEE international conference on software maintenance and evolution …, 2016 | 20 | 2016 |
Bespoke tools: adapted to the concepts developers know B Johnson, R Pandita, E Murphy-Hill, S Heckman Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 18 | 2015 |
Enabling forensics by proposing heuristics to identify mandatory log events J King, R Pandita, L Williams Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-11, 2015 | 18 | 2015 |
Literature review of testing techniques for medical device software JJ Majikes, R Pandita, T Xie Proceedings of the 4th Medical Cyber-Physical Systems Workshop (MCPS’13 …, 2013 | 18 | 2013 |
Tmap: Discovering relevant api methods through text mining of api documentation R Pandita, R Jetley, S Sudarsan, T Menzies, L Williams Journal of Software: Evolution and Process 29 (12), e1845, 2017 | 16 | 2017 |
Veteran developers' contributions and motivations: An open source perspective P Morrison, R Pandita, E Murphy-Hill, A McLaughlin 2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2016 | 14 | 2016 |
Contemporary COBOL: Developers' perspectives on defects and defect location A Ciborowska, A Chakarov, R Pandita 2021 IEEE International Conference on Software Maintenance and Evolution …, 2021 | 9 | 2021 |
No half-measures: A study of manual and tool-assisted end-user programming tasks in Excel R Pandita, C Parnin, F Hermans, E Murphy-Hill 2018 ieee symposium on visual languages and human-centric computing (vl/hcc …, 2018 | 9 | 2018 |
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors. W Yang, X Xiao, R Pandita, W Enck, T Xie ACM Symposium and Bootcamp on the Science of Security (HotSoS), 2014 | 8 | 2014 |