Personal information

Verified email domains

Security and privacy analysis, Security testing, string constraint solving, code-based vulnerability analysis
Singapore

Biography

Lwin Khin Shar is associate professor at School of Computing & Information Systems, Singapore Management University. He holds a PhD degree from Nanyang Technological University (NTU), Singapore, a B.Eng (honors) in Electrical & Electronic Engineering, NTU.

Shar's research focuses on security analysis of software systems using program analysis, testing, and machine learning in general. In particular, he works on vulnerability detection and malware analysis in software systems.

Activities

Employment (4)

Singapore Management University: Singapore, SG

2022-01-01 to present | Associate Professor of Computer Science (Practice) (School of Computing & Information Systems)
Employment
Source: Self-asserted source
Lwin Khin Shar

Singapore Management University School of Computing and Information Systems: Singapore, SG

2019-01-01 to 2021-12-31 | Assistant Professor (Practice) (School of Computing and Information Systems)
Employment
Source: Self-asserted source
Lwin Khin Shar

Nanyang Technological University: Singapore, SG

2017-08-01 to 2018-12-31 | Research Scientist (School of Computer Science and Engineering)
Employment
Source: Self-asserted source
Lwin Khin Shar

University of Luxembourg Computer Science and Communications Research Unit: Luxembourg-Kirchberg, LU

2014-01-15 to 2017-07-31 | Research Associate (Interdisciplinary Centre for Security, Reliability and Trust)
Employment
Source: Self-asserted source
Lwin Khin Shar

Education and qualifications (2)

Nanyang Technological University: Singapore, SG

2008 to 2013 | Ph. D (Software Engineering) (Electrical & Electronic Engineering)
Education
Source: Self-asserted source
Lwin Khin Shar

Nanyang Technological University: Singapore, SG

2005-08-01 to 2007-12-31 | B.Eng (1st Class Honors) (School of Electrical & Electronic Engineering)
Education
Source: Self-asserted source
Lwin Khin Shar

Professional activities (2)

Association for Computing Machinery: New York, NY, US

2021 to present
Membership
Source: Self-asserted source
Lwin Khin Shar

IEEE: New York, NY, US

2011 to present | Regular Member
Membership
Source: Self-asserted source
Lwin Khin Shar

Funding (2)

ADrone: Auditing Drone Behaviours for Accountability of Criminal/Malicious Activities

2021-09 to 2023-08 | Grant
National Research Foundation Singapore (Singapore, SG)
Source: Self-asserted source
Lwin Khin Shar

AutoPrivacyModel: Automated Feature Modelling for Identifying Illegitimate Uses of Privacy-Sensitive Data in Mobile Applications

Works (50 of 53)

Items per page:
Page 1 of 2

Fuzzing drones for anomaly detection: A systematic literature review

Computers & Security
2025-01 | Journal article
Contributors: Vikas K. Malviya; Wei Minn; Lwin Khin Shar; Lingxiao Jiang
Source: check_circle
Crossref
grade
Preferred source (of 3)‎

Decentralized Multimedia Data Sharing in IoV: A Learning-based Equilibrium of Supply and Demand

arXiv
2024 | Other
EID:

2-s2.0-85191644009

Part of ISSN: 23318422
Contributors: Fan, J.; Xu, M.; Guo, J.; Shar, L.K.; Kang, J.; Niyato, D.; Lam, K.-Y.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks

arXiv
2024 | Other
EID:

2-s2.0-85191023813

Part of ISSN: 23318422
Contributors: Fan, J.; Shar, L.K.; Guo, J.; Yang, W.; Niyato, D.; Lam, K.-Y.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

DronLomaly: Runtime Log-based Anomaly Detector for DJI Drones

Proceedings - International Conference on Software Engineering
2024 | Conference paper
EID:

2-s2.0-85194852030

Part of ISBN: 9798400705021
Part of ISSN: 02705257
Contributors: Minn, W.; Tun, Y.N.; Shar, L.K.; Jiang, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 3)‎

Fuzzing Drones for Anomaly Detection: A Systematic Literature Review

SSRN
2024 | Other
EID:

2-s2.0-85191100911

Part of ISSN: 15565068
Contributors: Malviya, V.K.; Minn, W.; Shar, L.K.; Jiang, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions

arXiv
2024 | Other
EID:

2-s2.0-85203136254

Part of ISSN: 23318422
Contributors: Cheng, Y.; Shar, L.K.; Zhang, T.; Yang, S.; Dong, C.; Lo, D.; Shi, Z.; Sun, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

Security Modelling for Cyber-Physical Systems: A Systematic Literature Review

arXiv
2024 | Other
EID:

2-s2.0-85192872505

Part of ISSN: 23318422
Contributors: Huang, S.; Poskitt, C.M.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

The Price of Prompting: Profiling Energy Use in Large Language Models Inference

arXiv
2024 | Other
EID:

2-s2.0-85201318078

Part of ISSN: 23318422
Contributors: Husom, E.J.; Shar, L.K.; Goknil, A.; Sen, S.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

An Industrial Practice for Securing Android Apps in the Banking Domain

Proceedings - 2023 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023
2023 | Conference paper
EID:

2-s2.0-85179011907

Part of ISBN: 9798350329964
Contributors: Malviya, V.K.; Phan, P.; Tun, Y.N.; Ching, A.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian Optimization

Proceedings - 2023 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023
2023 | Conference paper
EID:

2-s2.0-85178999204

Part of ISBN: 9798350329964
Contributors: Shar, L.K.; Goknil, A.; Husom, E.J.; Sen, S.; Tun, Y.N.; Kim, K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Decentralized Multimedia Data Sharing in IoV: A Learning-Based Equilibrium of Supply and Demand

IEEE Transactions on Vehicular Technology
2023 | Journal article
EID:

2-s2.0-85174812085

Part of ISSN: 19399359 00189545
Contributors: Fan, J.; Xu, M.; Guo, J.; Shar, L.K.; Kang, J.; Niyato, D.; Lam, K.-Y.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 3)‎

Experimental comparison of features, analyses, and classifiers for Android malware detection

Empirical Software Engineering
2023 | Journal article
EID:

2-s2.0-85172124874

Part of ISSN: 15737616 13823256
Contributors: Shar, L.K.; Demissie, B.F.; Ceccato, M.; Tun, Y.N.; Lo, D.; Jiang, L.; Bienert, C.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 3)‎

Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph Embedding

Proceedings - 2023 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023
2023 | Conference paper
EID:

2-s2.0-85179002567

Part of ISBN: 9798350329964
Contributors: Malviya, V.K.; Tun, Y.N.; Leow, C.W.; Xynyn, A.T.; Shar, L.K.; Jiang, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

AP-Coach: Formative feedback generation for learning introductory programming concepts

Proceedings - 2022 IEEE International Conference on Teaching, Assessment and Learning for Engineering, TALE 2022
2022 | Conference paper
EID:

2-s2.0-85163894772

Part of ISBN: 9781665491174
Contributors: Duong, T.N.B.; Shar, L.K.; Shankararaman, V.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Automated reverse engineering of role-based access control policies of web applications

Journal of Systems and Software
2022 | Journal article
EID:

2-s2.0-85118119903

Part of ISSN: 01641212
Contributors: Le, H.T.; Shar, L.K.; Bianculli, D.; Briand, L.C.; Nguyen, C.D.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 3)‎

Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2022 | Conference paper
EID:

2-s2.0-85145020866

Part of ISBN: 9783031230196
Part of ISSN: 16113349 03029743
Contributors: Fan, J.; Shar, L.K.; Guo, J.; Yang, W.; Niyato, D.; Lam, K.-Y.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning

Proceedings - Asia-Pacific Software Engineering Conference, APSEC
2022 | Conference paper
EID:

2-s2.0-85149180411

Part of ISBN: 9781665455374
Part of ISSN: 15301362
Contributors: Shar, L.K.; Minn, W.; Ta, N.B.D.; Fan, J.; Jiang, L.; Kiat, D.L.W.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps

ACM International Conference Proceeding Series
2022 | Conference paper
EID:

2-s2.0-85146957377

Part of ISBN: 9781450396240
Contributors: Malviya, V.K.; Leow, C.W.; Kasthuri, A.; Tun, Y.N.; Shar, L.K.; Jiang, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control

Proceedings - International Conference on Software Engineering
2022 | Conference paper
EID:

2-s2.0-85132417166

Part of ISBN: 9781665495981
Part of ISSN: 02705257
Contributors: Duan, M.; Jiang, L.; Shar, L.K.; Gao, D.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner

arXiv
2022 | Other
EID:

2-s2.0-85169198615

Part of ISSN: 23318422
Contributors: Shar, L.K.; Shim, K.J.; Poskitt, C.M.; Ying, L.; Wong, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner

Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE
2022 | Conference paper
EID:

2-s2.0-85134432055

Part of ISBN: 9781450392013
Part of ISSN: 1942647X
Contributors: Shar, L.K.; Poskitt, C.M.; Shim, K.J.; Wong, L.Y.L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

COVID-19 One Year on-Security and Privacy Review of Contact Tracing Mobile Apps

IEEE Pervasive Computing
2021 | Journal article
EID:

2-s2.0-85118262683

Part of ISSN: 15582590 15361268
Contributors: Ang, V.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 3)‎

Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware Detection

Proceedings - Asia-Pacific Software Engineering Conference, APSEC
2021 | Conference paper
EID:

2-s2.0-85126259482

Part of ISBN: 9781665437844
Part of ISSN: 15301362
Contributors: Shar, L.K.; Duong, T.N.B.; Lo, D.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Out of sight, out of mind? How vulnerable dependencies affect open-source projects

Empirical Software Engineering
2021 | Journal article
EID:

2-s2.0-85104680875

Part of ISSN: 15737616 13823256
Contributors: Prana, G.A.A.; Sharma, A.; Shar, L.K.; Foo, D.; Santosa, A.E.; Sharma, A.; Lo, D.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving

IEEE Transactions on Software Engineering
2020 | Journal article
EID:

2-s2.0-85048163216

Part of ISSN: 19393520 00985589
Contributors: Thome, J.; Shar, L.K.; Bianculli, D.; Briand, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 3)‎

Experimental comparison of features and classifiers for Android malware detection

Proceedings - 2020 IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems, MOBILESoft 2020
2020 | Conference paper
EID:

2-s2.0-85094860473

Part of ISBN: 9781450379595
Contributors: Shar, L.K.; Demissie, B.F.; Ceccato, M.; Minn, W.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Security analysis of permission re-delegation vulnerabilities in Android apps

Empirical Software Engineering
2020 | Journal article
EID:

2-s2.0-85090976109

Part of ISSN: 15737616 13823256
Contributors: Demissie, B.F.; Ceccato, M.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

SmartFuzz: An automated smart fuzzing approach for testing smartthings apps

Proceedings - Asia-Pacific Software Engineering Conference, APSEC
2020 | Conference paper
EID:

2-s2.0-85102351213

Part of ISBN: 9781728195537
Part of ISSN: 15301362
Contributors: Shar, L.K.; Binh Duong, T.N.; Jiang, L.; Lo, D.; Minn, W.; Yong Yeo, G.K.; Kim, E.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

AnFlo: Detecting anomalous sensitive information flows in android apps

arXiv
2018 | Other
EID:

2-s2.0-85169224762

Part of ISSN: 23318422
Contributors: Demissie, B.F.; Ceccato, M.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

AnFlo: Detecting anomalous sensitive information flows in Android apps

Proceedings - International Conference on Software Engineering
2018 | Conference paper
EID:

2-s2.0-85051638510

Part of ISBN: 9781450357128
Part of ISSN: 02705257
Contributors: Demissie, B.F.; Ceccato, M.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Modeling Security and Privacy Requirements: a Use Case-Driven Approach

Information and Software Technology
2018 | Journal article
EID:

2-s2.0-85046162342

Part of ISSN: 09505849
Contributors: Mai, P.X.; Goknil, A.; Shar, L.K.; Pastore, F.; Briand, L.C.; Shaame, S.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 3)‎

Security slicing for auditing common injection vulnerabilities

Journal of Systems and Software
2018 | Journal article
EID:

2-s2.0-85014466419

Part of ISSN: 01641212
Contributors: Thomé, J.; Shar, L.K.; Bianculli, D.; Briand, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

JoanAudit: A tool for auditing common injection vulnerabilities

Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering
2017 | Conference paper
EID:

2-s2.0-85030775486

Part of ISBN: 9781450351058
Contributors: Thomé, J.; Shar, L.K.; Bianculli, D.; Briand, L.C.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Search-Driven String Constraint Solving for Vulnerability Detection

Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017
2017 | Conference paper
EID:

2-s2.0-85027689033

Part of ISBN: 9781538638682
Contributors: Thome, J.; Shar, L.K.; Bianculli, D.; Briand, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Security slicing for auditing XML, XPath, and SQL injection vulnerabilities

2015 IEEE 26th International Symposium on Software Reliability Engineering, ISSRE 2015
2016 | Conference paper
EID:

2-s2.0-84964864428

Part of ISBN: 9781509004065
Contributors: Thomé, J.; Shar, L.K.; Briand, L.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Mining Patterns of Unsatisfiable Constraints to Detect Infeasible Paths

Proceedings - 10th International Workshop on Automation of Software Test, AST 2015
2015 | Conference paper
EID:

2-s2.0-84945412211

Part of ISBN: 9781467370226
Contributors: Ding, S.; Tan, H.B.K.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning

IEEE Transactions on Dependable and Secure Computing
2015 | Journal article
EID:

2-s2.0-84959283014

Part of ISSN: 19410018 15455971
Contributors: Shar, L.K.; Briand, L.C.; Tan, H.B.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Empirical comparison of intermediate representations for Android applications

Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE
2014 | Conference paper
EID:

2-s2.0-84938305217

Part of ISSN: 23259086 23259000
Contributors: Arnatovich, Y.L.; Tan, H.B.K.; Ding, S.; Liu, K.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier

A scalable approach for malware detection through bounded feature space behavior modeling

2013 28th IEEE/ACM International Conference on Automated Software Engineering, ASE 2013 - Proceedings
2013 | Conference paper
EID:

2-s2.0-84893627625

Part of ISBN: 9781479902156
Contributors: Chandramohan, M.; Tan, H.B.K.; Briand, L.C.; Shar, L.K.; Padmanabhuni, B.M.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Defeating SQL injection

Computer
2013 | Other
EID:

2-s2.0-84875872665

Part of ISSN: 00189162
Contributors: Shar, L.K.; Tan, H.B.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis

Proceedings - International Conference on Software Engineering
2013 | Conference paper
EID:

2-s2.0-84886430853

Part of ISBN: 9781467330763
Part of ISSN: 02705257
Contributors: Shar, L.K.; Beng Kuan Tan, H.; Briand, L.C.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns

Information and Software Technology
2013 | Journal article
EID:

2-s2.0-84880843062

Part of ISSN: 09505849
Contributors: Shar, L.K.; Tan, H.B.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Towards a hybrid framework for detecting input manipulation vulnerabilities

Proceedings - Asia-Pacific Software Engineering Conference, APSEC
2013 | Conference paper
EID:

2-s2.0-84936877880

Part of ISSN: 15301362
Contributors: Ding, S.; Tan, H.B.K.; Shar, L.K.; Padmanabhuni, B.M.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Auditing the XSS defence features implemented in web application programs

IET Software
2012 | Journal article
EID:

2-s2.0-84866865930

Part of ISSN: 17518806
Contributors: Shar, L.K.; Tan, H.B.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Defending against cross-site scripting attacks

Computer
2012 | Other
EID:

2-s2.0-84858250036

Part of ISSN: 00189162
Contributors: Shar, L.K.; Tan, H.B.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities

Proceedings - International Conference on Software Engineering
2012 | Conference paper
EID:

2-s2.0-84864239564

Part of ISBN: 9781467310673
Part of ISSN: 02705257
Contributors: Shar, L.K.; Tan, H.B.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Predicting common web application vulnerabilities from input validation and sanitization code patterns

2012 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012 - Proceedings
2012 | Conference paper
EID:

2-s2.0-84866920422

Part of ISBN: 9781450312042
Contributors: Shar, L.K.; Tan, H.B.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Scalable malware clustering through coarse-grained behavior modeling

Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering, FSE 2012
2012 | Conference paper
EID:

2-s2.0-84871345716

Part of ISBN: 9781450316149
Contributors: Chandramohan, M.; Tan, H.B.K.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

Semi-automated verification of defense against SQL injection in web applications

Proceedings - Asia-Pacific Software Engineering Conference, APSEC
2012 | Conference paper
EID:

2-s2.0-84874631703

Part of ISBN: 9780769549224
Part of ISSN: 15301362
Contributors: Liu, K.; Tan, H.B.K.; Shar, L.K.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
grade
Preferred source (of 2)‎

A code-based input partitioning method for equivalence class testing

Proceedings - 2010 2nd WRI World Congress on Software Engineering, WCSE 2010
2010 | Conference paper
EID:

2-s2.0-79952945165

Part of ISBN: 9780769543031
Contributors: Shar, L.K.; Tan, H.B.K.; Lui, H.
Source: Self-asserted source
Lwin Khin Shar via Scopus - Elsevier
Items per page:
Page 1 of 2

Peer review (14 reviews for 7 publications/grants)

Review activity for Automated software engineering. (1)
Review activity for Computers & security. (3)
Review activity for Cybersecurity. (1)
Review activity for Empirical software engineering. (2)
Review activity for Journal of information security and applications. (2)
Review activity for The Journal of systems and software. (4)
Review activity for Wirtschaftsinformatik. (1)