"Benchmarking Static Analysis Tools for Web Security", IEEE Transactions on Reliability, vol. 67, no. 3: IEEE, pp. 1159–1175, 2018.
"An empirical study on combining diverse static analysis tools for web security vulnerabilities based on development scenarios", Computing: Springer, pp. 1–25, 2018.
"FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows", 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE): IEEE, pp. 567–572, 2018.
"REPSYS: A Robust and Distributed Incentive Scheme for Collaborative Caching and Dissemination in Content-Centric Cellular-Based Vehicular Delay-Tolerant Networks", IEEE Wireless Communications, vol. 25, no. 3: IEEE, pp. 65–71, 2018.
"Chrysaor: Fine-Grained, Fault-Tolerant Cloud-of-Clouds MapReduce", Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing: IEEE Press, pp. 421–430, 2017.
"On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study", 2017 13th European Dependable Computing Conference (EDCC): IEEE, pp. 121–128, 2017.
"Demonstrating a Tool for Injection Attack Prevention in MySQL", Dependable Systems and Networks (DSN), 2017 47th Annual IEEE/IFIP International Conference on: IEEE, pp. 551–558, 2017.
"On the Design of Resilient Multicloud MapReduce", IEEE Cloud Computing, vol. 4, no. 4: IEEE, pp. 74–82, 2017.
"DEKANT: a static analysis tool that learns to detect web application vulnerabilities", Proceedings of the 25th International Symposium on Software Testing and Analysis: ACM, pp. 1–11, 2016.
"Detecting and removing web application vulnerabilities with static analysis and data mining", IEEE Transactions on Reliability, vol. 65, no. 1: IEEE, pp. 54–69, 2016.
"Equipping WAP with weapons to detect vulnerabilities", Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016.
"Equipping WAP with WEAPONS to Detect Vulnerabilities: Practical Experience Report", Dependable Systems and Networks (DSN), 2016 46th Annual IEEE/IFIP International Conference on: IEEE, pp. 630–637, 2016.
"Hacking the DBMS to Prevent Injection Attacks", Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy: ACM, pp. 295–306, 2016.
"JITeR: Just-in-time application-layer routing", Computer Networks, vol. 104: Elsevier, pp. 122–136, 2016.
"Medusa: An efficient cloud fault-tolerant mapreduce", Cluster, Cloud and Grid Computing (CCGrid), 2016 16th IEEE/ACM International Symposium on: IEEE, pp. 443–452, 2016.