Follow
Yan Wu
Title
Cited by
Cited by
Year
The bugs framework (BF): A structured approach to express bugs
I Bojanova, PE Black, Y Yesha, Y Wu
2016 IEEE International Conference on Software Quality, Reliability and …, 2016
402016
Using semantic templates to study vulnerabilities recorded in large software repositories
Y Wu, RA Gandhi, H Siy
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
382010
Features selection and prediction for IoT attacks
J Su, S He, Y Wu
High-Confidence Computing 2 (2), 100047, 2022
202022
Empirical results on the study of software vulnerabilities (NIER track)
Y Wu, H Siy, R Gandhi
Proceedings of the 33rd International Conference on Software Engineering …, 2011
182011
They know your weaknesses–do you?: Reintroducing common weakness enumeration
Y Wu, I Bojanova, Y Yesha
CrossTalk 45, 2015
112015
An ontology to support empirical studies in software engineering
H Siy, Y Wu
2009 International Conference on Computing, Engineering and Information, 12-15, 2009
112009
Experience of incorporating NIST standards in a digital forensics curricula
S Roy, Y Wu, KN LaVenia
2019 7th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2019
92019
Studying software vulnerabilities
RA Gandhi, H Siy, Y Wu
Crosstalk: The Journal of Defense Software Engineering, 16-20, 2010
92010
A Flowchart for Rapid Technical Debt Management Decision Making.
C Zhang, Y Wu
J. Softw. 11 (2), 212-219, 2016
82016
Construction of ontology-based software repositories by text mining
Y Wu, H Siy, M Zand, V Winter
Computational Science–ICCS 2007: 7th International Conference, Beijing …, 2007
82007
Classifying software vulnerabilities by using the bugs framework
TM Adhikari, Y Wu
2020 8th International Symposium on Digital Forensics and Security (ISDFS), 1-6, 2020
72020
基于分类技术的搜索引擎排名算法——CategoryRank
陈伟柱, 陈英, 吴燕
计算机应用 25 (5), 995-997, 2005
72005
Analysis of intrusion detection dataset NSL-KDD using KNIME analytics
M Arafat, A Jain, Y Wu
International Conference on Cyber Warfare and Security, 573-X, 2018
62018
A Review of Deep Learning Techniques Applied in Lung Cancer Diagnosis
TM Adhikari, H Liska, Z Sun, Y Wu
Signal and Information Processing, Networking and Computers: Proceedings of …, 2020
42020
Towards a Periodic Table of Bugs
PE Black, I Bojanova, Y Yesha, Y Wu
15th High Confidence Software and Systems Conference (HCSS), 2015
42015
Automated Software Testing Starting from Static Analysis: Current State of the Art
Y Wu, J Su, DD Moran, CD Near
arXiv preprint arXiv:2301.06215, 2023
32023
Discovering Meaningful Clusters from Mining the Software Engineering Literature.
Y Wu, HP Siy, L Fan
SEKE, 613-618, 2008
32008
Reconstruction of common weakness enumeration
Y Wu, I Bojanova, Y Yesha
Sl]: IEEE Software Technology Conference (STC), 28, 2014
22014
Using 2-interactive measures in nonlinear classifications
Y Wu, Z Wang
NAFIPS 2007-2007 Annual Meeting of the North American Fuzzy Information …, 2007
22007
Evaluation of the Multifactor Authentication Technique for mobile applications
T Zhang, L Yang, Y Wu
Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–20