| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
IEEE Access
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Access
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Secur. Priv.
|
| 2025 | A | conf |
EASE
|
| 2025 | J | jnl |
CoRR
|
| 2025 | A | conf |
EASE
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
SoftwareX
|
| 2024 | J | jnl |
Comput.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
ERCIM News
|
| 2024 | J | jnl |
IEEE Secur. Priv.
|
| 2024 | A | conf |
SANER
|
| 2024 | J | jnl |
IEEE Access
|
| 2024 | A | conf |
EASE
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
Softw.
|
| 2024 | J | jnl |
Acta Cybern.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
IEEE Access
|
| 2022 | — | conf |
ICCSA (Workshops 4)
|
| 2022 | C | conf |
ICSOFT
|
| 2022 | — | conf |
ICSOFT (Selected Papers)
|
| 2022 | C | conf |
SCAM
|
| 2022 | A | conf |
MSR
|
| 2022 | J | jnl |
IEEE Access
|
| 2021 | Misc | conf |
A Comparison of Different Source Code Representation Methods for Vulnerability Prediction in Python.
QUATIC
|
| 2021 | J | jnl |
A Comparison of Different Source Code Representation Methods for Vulnerability Prediction in Python.
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2021 | C | conf |
ICSOFT
|
| 2021 | — | conf |
ICCSA (9)
|
| 2021 | A | conf |
MSR
|
| 2021 | J | jnl |
CoRR
|
| 2020 | — | conf |
ICCSA (4)
|
| 2020 | J | jnl |
SoftwareX
|
| 2020 | J | jnl |
CoRR
|
| 2020 | A | conf |
MSR
|
| 2020 | J | jnl |
CoRR
|
| 2020 | — | conf |
ICCSA (4)
|
| 2019 | — | conf |
RAISE@ICSE
|
| 2018 | — | conf |
ICCSA (5)
|
| 2018 | — | conf |
ICCSA (5)
|
| 2018 | J | jnl |
Inf. Softw. Technol.
|
| 2018 | — | conf |
WETSEB@ICSE
|
| 2018 | C | conf |
SCAM
|
| 2016 | A | conf |
SANER
|
| 2016 | — | conf |
A Manually Validated Code Refactoring Dataset and Its Assessment Regarding Software Maintainability.
PROMISE
|
| 2016 | — | conf |
ICCSA (4)
|
| 2015 | — | conf |
ICCSA (5)
|
| 2015 | — | — |
|
| 2015 | A | conf |
ICSME
|
| 2015 | — | conf |
ICCSA (5)
|
| 2015 | C | conf |
SCAM
|
| 2015 | A | conf |
ICSME
|
| 2014 | J | jnl |
Acta Cybern.
|
| 2014 | — | conf |
CURAC
|
| 2014 | — | conf |
CSMR-WCRE
|
| 2014 | J | jnl |
Acta Cybern.
|
| 2014 | — | ch. |
Evolving Software Systems
|
| 2014 | — | conf |
ICCSA (5)
|
| 2013 | J | jnl |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol.
|
| 2013 | J | jnl |
Acta Cybern.
|
| 2013 | — | conf |
CURAC
|
| 2013 | — | conf |
CSMR
|
| 2013 | — | conf |
ICSM
|
| 2012 | — | conf |
ICSM
|
| 2011 | — | conf |
ICSM
|
| 2011 | — | conf |
FGIT-ASEA/DRBC/EL
|
| 2010 | — | conf |
PPPJ
|
| 2010 | — | conf |
CSMR
|
| 2010 | — | conf |
CSMR
|
| 2008 | — | conf |
WCRE
|