Abstract is missing.
- Android App Merging for Benchmark Speed-Up and Analysis Lift-UpFelix Pauck, Shikun Zhang. 7-12 [doi]
- BenchPress: Analyzing Android App Vulnerability Benchmark SuitesJoydeep Mitra, Venkatesh Prasad Ranganath, Aditya Narkar. 13-18 [doi]
- SeMA: A Design Methodology for Building Secure Android AppsJoydeep Mitra, Venkatesh Prasad Ranganath. 19-22 [doi]
- Automatic Components Separation of Obfuscated Android Applications: An Empirical Study of Design Based FeaturesAmit Kumar Mondal, Chanchal K. Roy, Banani Roy, Kevin A. Schneider. 23-28 [doi]
- Explaining Static Analysis - A PerspectiveMarcus Nachtigall, Lisa Nguyen Quang Do, Eric Bodden. 29-32 [doi]
- Explaining Business Process Software with Fulib-ScenariosAlbert Zündorf, Sebastian Copei, Ira Diethelm, Claude Draude, Adrian Kunz, Ulrich Norbisrath. 33-36 [doi]
- Don't Forget Your Roots! Using Provenance Data for Transparent and Explainable Development of Machine Learning ModelsSophie F. Jentzsch, Nico Hochgeschwender. 37-40 [doi]
- A Hybrid Editor for Fast Robot Mission PrototypingThomas Witte, Matthias Tichy. 41-44 [doi]
- Framework for Trustworthy Software DevelopmentR. P. Jagadeesh Chandra Bose, Kapil Singi, Vikrant Kaulgud, Kanchanjot Kaur Phokela, Sanjay Podder. 45-48 [doi]
- Towards Automated Security Design Flaw DetectionLaurens Sion, Katja Tuma, Riccardo Scandariato, Koen Yskout, Wouter Joosen. 49-56 [doi]
- Security-Related Commits in Open Source Web Browser ProjectsÁkos Kiss 0001, Renáta Hodován. 57-60 [doi]
- Challenges in Secure Engineering of Critical Infrastructure SystemsSridhar Adepu, Eunsuk Kang, Aditya P. Mathur. 61-64 [doi]
- The Effect of Weighted Moving Windows on Security Vulnerability PredictionPatrick Kwaku Kudjo, Jinfu Chen, Selasie Brown Aformaley, Solomon Mensah. 65-68 [doi]
- Securing Smart Contracts in BlockchainJaturong Kongmanee, Phongphun Kijsanayothin, Rattikorn Hewett. 69-76 [doi]
- On Secret Management and Handling in Mobile Application Development Life Cycle: A Position PaperPanuchart Bunyakiati, Usa Sammapun. 77-80 [doi]
- Synthesizing Mutable Configurations: Setting up Systems for SuccessTim Nelson, Natasha Danas, Theophilos Giannakopoulos, Shriram Krishnamurthi. 81-85 [doi]
- Encoding Adaptability of Software Engineering Tools as Algorithm Configuration Problem: A Case StudyMaike Basmer, Timo Kehrer. 86-89 [doi]
- Toward Evaluation of Deployment Architecture of ML-Based Cyber-Physical SystemsLucas Gisselaire, Florian Cario, Quentin Guerre-Berthelot, Bastien Zigmann, Lydie du Bousquet, Masahide Nakamura. 90-93 [doi]
- Where Does LDA Sit for GitHub?Xukun Wang, Matthias Lee, Angie Pinchbeck, Fatemeh Fard. 94-97 [doi]
- Predicting Defects with Latent and Semantic Features from Commit Logs in an Industrial SettingBeyza Eken, RiFat Atar, Sahra Sertalp, Ayse Tosun. 98-105 [doi]
- Mining Text in Incident Repositories: Experiences and Perspectives on Adopting Machine Learning Solutions in PracticeJanardan Misra, Sanjay Podder. 106-113 [doi]
- Project Achilles: A Prototype Tool for Static Method-Level Vulnerability Detection of Java Source Code Using a Recurrent Neural NetworkNicholas Saccente, Josh Dehlinger, Lin Deng, Suranjan Chakraborty, Yin Xiong. 114-121 [doi]
- Can AI Close the Design-Code Abstraction Gap?James Ivers, Ipek Ozkaya, Robert L. Nord. 122-125 [doi]
- On the Engineering of AI-Powered SystemsEvgeny Kusmenko, Svetlana Pavlitskaya, Bernhard Rumpe, Sebastian Stüber. 126-133 [doi]
- Service Application Knowledge Graph and Dependency SystemHanzhang Wang, Chirag Shah, Praseeda Sathaye, Amit Nahata, Sanjeev Katariya. 134-136 [doi]