Cross-project vulnerability prediction based on software metrics and deep learning I Kalouptsoglou, M Siavvas, D Tsoukalas, D Kehagias Computational Science and Its Applications–ICCSA 2020: 20th International …, 2020 | 24 | 2020 |
Examining the capacity of text mining and software metrics in vulnerability prediction I Kalouptsoglou, M Siavvas, D Kehagias, A Chatzigeorgiou, ... Entropy 24 (5), 651, 2022 | 17 | 2022 |
An empirical evaluation of the usefulness of word embedding techniques in deep learning-based vulnerability prediction I Kalouptsoglou, M Siavvas, D Kehagias, A Chatzigeorgiou, ... International ISCIS Security Workshop, 23-37, 2021 | 16 | 2021 |
Software vulnerability prediction: A systematic mapping study I Kalouptsoglou, M Siavvas, A Ampatzoglou, D Kehagias, ... Information and Software Technology, 107303, 2023 | 13 | 2023 |
The IoTAC software security-by-design platform: Concept, challenges, and preliminary overview M Siavvas, E Gelenbe, D Tsoukalas, I Kalouptsoglou, M Mathioudaki, ... 2022 18th International Conference on the Design of Reliable Communication …, 2022 | 8 | 2022 |
Time series forecasting of software vulnerabilities using statistical and deep learning models I Kalouptsoglou, D Tsoukalas, M Siavvas, D Kehagias, A Chatzigeorgiou, ... Electronics 11 (18), 2820, 2022 | 7 | 2022 |
Security Monitoring during Software Development: An Industrial Case Study M Siavvas, D Tsoukalas, I Kalouptsoglou, E Manganopoulou, G Manolis, ... Applied Sciences 13 (12), 6872, 2023 | 4 | 2023 |
A self-adaptive approach for assessing the criticality of security-related static analysis alerts M Siavvas, I Kalouptsoglou, D Tsoukalas, D Kehagias Computational Science and Its Applications–ICCSA 2021: 21st International …, 2021 | 4 | 2021 |
Vulnerability classification on source code using text mining and deep learning techniques I Kalouptsoglou, M Siavvas, A Ampatzoglou, D Kehagias, ... 2024 IEEE 24th International Conference on Software Quality, Reliability …, 2024 | 1 | 2024 |
Transforming the field of Vulnerability Prediction: Are Large Language Models the key? M Siavvas, I Kalouptsoglou, E Gelenbe, D Kehagias, D Tzovaras | | |
Digital Transformation of Security Standards: Requirements Extraction using Large Language Models M Siavvas, G Xanthopoulou, I Kalouptsoglou, D Kehagias, D Tzovaras | | |
Vulnerability prediction using pre-trained models: An empirical evaluation I Kalouptsoglou, M Siavvas, A Ampatzoglou, D Kehagias, ... | | |
Software Requirements Classification: From Bag-of-Words to Transformer G Xanthopoulou, M Siavvas, I Kalouptsoglou, D Kehagias, D Tzovaras | | |