Name
Affiliation
Papers
DIMITRIS MITROPOULOS
Athens University of Economics and Business
38
Collaborators
Citations 
PageRank 
46
90
15.14
Referers 
Referees 
References 
239
1054
535
Search Limit
1001000
Title
Citations
PageRank
Year
CrossVul: a cross-language vulnerability dataset with commit data30.382021
A Replication Package for PyCG: Practical Call Graph Generation in Python00.342021
PyCG: Practical Call Graph Generation in Python00.342021
Replication Package for Article: Data-Oriented Differential Testing of Object-Relational Mapping Systems00.342021
Well-typed programs can go wrong: a study of typing-related bugs in JVM compilers00.342021
Data-Oriented Differential Testing of Object-Relational Mapping Systems10.362021
Practical fault detection in puppet programs30.422020
A model for detecting faults in build specifications10.352020
Pdguard: An Architecture For The Control And Secure Processing Of Personal Data00.342020
Defending Against Web Application Attacks: Approaches, Challenges and Implications10.372019
Detecting Missing Dependencies and Notifiers in Puppet Programs.00.342019
Pythia: Identifying Dangerous Data-flows in Django-based Applications00.342019
Time present and time past: analyzing the evolution of JavaScript code in the wild10.352019
VulinOSS: a dataset of security vulnerabilities in open-source systems.50.482018
Aspects of the History of Computing in Modern Greece.00.342018
How 1 million app calls can tell you a bit about malware.00.342017
Fatal injection: a survey of modern code injection attack countermeasures.00.342017
POSIX abstractions in modern operating systems: the old, the new, and the missing.90.642016
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints.50.432016
POSIX Has Become Outdated.00.342016
Charting the API minefield using software telemetry data120.582015
A type-safe embedding of SQL into Java using the extensible compiler framework J%60.422015
On the evolution of security bugs.00.342015
Securing Legacy Code with the TRACER Platform00.342014
TRACER: A Platform for Securing Legacy Code.00.342014
The Vulnerability Dataset of a Large Software Ecosystem10.352014
The bug catalog of the maven ecosystem110.672014
Security bugs in large software ecosystems00.342013
Data security in the cloud environment00.342013
Improving the quality of APIs through the analysis of software crash reports.00.342013
Dismal Code: Studying the Evolution of Security Bugs.40.532013
Blogs00.342012
Measuring the Occurrence of Security-Related Bugs through Software Evolution70.712012
Better safe than sorry: backup your backups00.342012
Countering Code Injection Attacks: A Unified Approach60.442011
Cyberdiversity: Measures and Initial Results10.372010
SDriver: Location-specific signatures prevent SQL injection attacks90.482009
Fortifying Applications Against Xpath Injection Attacks.40.372009