Mehdi Kholoosi (@mehdikholoosi) 's Twitter Profile
Mehdi Kholoosi

@mehdikholoosi

Ph.D. Candidate in the School of computer science at the University of Adelaide

ID: 1384572304991129600

calendar_today20-04-2021 18:19:32

24 Tweet

30 Followers

66 Following

SVM 2025 (@svmconf) 's Twitter Profile Photo

🚨Announcing our call for papers on #software #vulnerability management research. Deadline is 13th January 2023, don't miss out! #svm2023 ICSE

🚨Announcing our call for papers on #software #vulnerability management research. 
Deadline is 13th January 2023, don't miss out! #svm2023 <a href="/ICSEconf/">ICSE</a>
Roland Croft (@croftroland) 's Twitter Profile Photo

The preprint of our ICSE paper: Data Quality for Software Vulnerability Datasets, is now available! Have a read if you're interested in data-driven methods or AI for software security. arxiv.org/abs/2301.05456

Triet Le (@lhmtriet) 's Twitter Profile Photo

Beware #SE community! The current #vulnerability datasets are far from perfect, at least in the 5 quality attributes we investigated @crest_uofa. Takeaway: Always check/sanitize the data before using it for training your models.

Beware #SE community! The current #vulnerability datasets are far from perfect, at least in the 5 quality attributes we investigated @crest_uofa. Takeaway: Always check/sanitize the data before using it for training your models.
Centre for Research on Engineering Software Tech (@crest_centre) 's Twitter Profile Photo

Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels See link: drive.google.com/file/d/1Eb99lp… #sidechannelattacks #vulnerabilitymanagement #security

Centre for Research on Engineering Software Tech (@crest_centre) 's Twitter Profile Photo

🎉 Exciting News! 📚 Our work 'Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study' authored by Triet Le Triet Le , Xiaoning Du and Ali Babar Ali Babar has been accepted in Mining Software Repositories (MSR) 2024 ! 🚀🔒 🔍 We

🎉 Exciting News! 

📚 Our work 'Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study'  authored by Triet Le <a href="/lhmtriet/">Triet Le</a> , Xiaoning Du and Ali Babar <a href="/alibabar/">Ali Babar</a>  has been accepted in Mining Software Repositories (MSR) 2024 ! 🚀🔒

🔍 We
Triet Le (@lhmtriet) 's Twitter Profile Photo

If you're a security or software practitioner, we're keen to hear your day-to-day experience in tackling security vulnerabilities. Your input is valuable for the community to enhance software security tools and practices. Please also share with your network.