| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2026 | J | jnl |
Empir. Softw. Eng.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
IEEE Trans. Software Eng.
|
| 2024 | J | jnl |
IEEE Trans. Software Eng.
|
| 2024 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2024 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2024 | J | jnl |
CoRR
|
| 2024 | Misc | conf |
QUATIC
|
| 2024 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
ACM Trans. Softw. Eng. Methodol.
|
| 2023 | J | jnl |
CoRR
|
| 2023 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Empir. Softw. Eng.
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
J. Syst. Softw.
|
| 2020 | — | conf |
SEAMS@ICSE
|
| 2020 | J | jnl |
CoRR
|
| 2020 | J | jnl |
Using machine learning to assist with the selection of security controls during security assessment.
Empir. Softw. Eng.
|
| 2019 | B | conf |
REFSQ
|
| 2019 | J | jnl |
CoRR
|
| 2018 | J | jnl |
IEEE Trans. Syst. Man Cybern. Syst.
|
| 2018 | A | conf |
MoDELS
|
| 2018 | A | conf |
ISSTA
|
| 2017 | — | conf |
BPM (Demos)
|
| 2016 | — | conf |
SEHS@ICSE
|
| 2015 | B | conf |
FASE
|
| 2013 | — | conf |
SEHC@ICSE
|