Show all

2023

1.

Fitzroy D Nembhard, Marco M Carvalho

Teaming humans with virtual assistants to detect and mitigate vulnerabilities Book Chapter

In: Arai, K. (Ed.): vol. 711, Chapter Lecture Notes in Networks and Systems, pp. 565-576, Springer Nature Switzerland, 2023.

Abstract | Links | BibTeX | Tags: Human-machine teaming, virtual assistant, vulnerability detection, vulnerability mitigation

2021

2.

Nembhard, Fitzroy D.; Carvalho, Marco M.

A Smart and Defensive Human-Machine Approach to Code Analysis Proceedings Article

In: First International Workshop on Artificial Intelligence, IJCAI-ACD 2021, ijcai.org, 2021.

Abstract | BibTeX | Tags: agent, Google Assistant, NLP, virtual assistant, voice assistant, vulnerability detection

3.

Nembhard, Fitzroy D.; Carvalho, Marco M.

Conversational Code Analysis: The Future of Secure Coding Journal Article

In: IntechOpen, London, 2021.

Abstract | Links | BibTeX | Tags: Google Assistant, NLP, software security, virtual assistant, voice assistant, vulnerability detection

2019

4.

Nembhard, Fitzroy D.; Carvalho, Marco M.; Eskridge, Thomas C.

Towards the Application of Recommender Systems to Secure Coding Journal Article

In: EURASIP Journal on Information Security, vol. 2019, no. 1, pp. 9, 2019, ISBN: 2510-523X.

Abstract | Links | BibTeX | Tags: ab testing, bugs, code security, intellisense, java, minhash, recommender systems, simhash, software quality, user study, vulnerability detection

5.

Nembhard, Fitzroy; Carvalho, Marco

The Impact of Interface Design on the Usability of Code Analyzers Proceedings Article

In: 2019 SoutheastCon, pp. 1-6, 2019.

Links | BibTeX | Tags: ab testing, code analysis, code security, ui design, user study, vulnerability detection

2017

6.

Nembhard, Fitzroy; Carvalho, Marco; Eskridge, Thomas

A Hybrid Approach to Improving Program Security Proceedings Article

In: 2017 IEEE Symposium Series on Computational Intelligence (SSCI), 2017.

Abstract | BibTeX | Tags: code security, cybersecurity, recommender systems, topic modeling, vulnerability detection, vulnerability mitigation