1. Ahmed Aleroud , George Karabatis , Prayank Sharma , and Peng He. 2014. Context and semantics for detection of cyber attacks . International Journal of Information and Computer Security 7 6, 1 ( 2014 ) , 63 - 92 . Ahmed Aleroud, George Karabatis, Prayank Sharma, and Peng He. 2014. Context and semantics for detection of cyber attacks. International Journal of Information and Computer Security 7 6, 1 ( 2014 ), 63-92.
2. Paul D Allison and Richard P Waterman. 2002. Fixed-efects negative binomial regression models. Sociological methodology 32 1 ( 2002 ) 247-265. Paul D Allison and Richard P Waterman. 2002. Fixed-efects negative binomial regression models. Sociological methodology 32 1 ( 2002 ) 247-265.
3. Uri Alon , Meital Zilberstein , Omer Levy , and Eran Yahav . 2019. code2vec: Learning distributed representations of code. ACM on Programming Languages 3 , POPL ( 2019 ) , 1 - 29 . Uri Alon, Meital Zilberstein, Omer Levy, and Eran Yahav. 2019. code2vec: Learning distributed representations of code. ACM on Programming Languages 3, POPL ( 2019 ), 1-29.
4. A Semantic-based Document Processing Framework: A Security Perspective
5. CVEfixes: automated collection of vulnerabilities and their fixes from open-source software