Contains the keyword security

Pletea D, Vasilescu B, Serebrenik A. Security and Emotion: Sentiment Analysis of Security Discussions on GitHub. In Proceedings of the 11th Working Conference on Mining Software Repositories [Internet]. New York, NY, USA: ACM; 2014. pp. 348–351. http://doi.acm.org/10.1145/2597073.2597117PDF icon pletea.pdf (250.26 KB)
Scacchi W, Alspaugh TA. Processes in Securing Open Architecture Software Systems. In Proceedings of the 2013 International Conference on Software and System Process [Internet]. New York, NY, USA: ACM; 2013. pp. 126–135. http://doi.acm.org/10.1145/2486046.2486068PDF icon Scacchi-Alspaugh-ICSSP13.pdf (1.27 MB)
Mauczka A, Schanes C, Fankhauser F, Bernhart M, Grechenig T. Mining security changes in FreeBSD. In 2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010)2010 7th IEEE Working Conference on Mining Software Repositories (MSR 2010). Cape Town, South Africa: IEEE; 2010. pp. 90 - 93.
Good N, Dhamija R, Grossklags J, Thaw D, Aronowitz S, Mulligan D, et al.. Stopping spyware at the gate: a user study of privacy, notice and spyware. In 2005 Symposium on Usable Privacy and Security. Pittsburgh, PA: Association for Computing Machinery; 2005. pp. 43-52.

Pages