1. Comparing the usability of cryptographic APIs;Acar,2017
2. Evaluation of static vulnerability detection tools with Java cryptographic API benchmarks;Afrose;IEEE Trans. Softw. Eng.,2023
3. Ami, A.S., Cooper, N., Kafle, K., Moran, K., Poshyvanyk, D., Nadkarni, A., 2022. Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques. In: 2022 IEEE Symposium on Security and Privacy. SP.
4. Developers struggle with authentication in blazor WebAssembly;André,2022
5. Is GitHub’s copilot as bad as humans at introducing vulnerabilities in code?;Asare;Empir. Softw. Eng.,2023