Rahul Pandita
Rahul Pandita
Staff Researcher, Github Inc.
Verified email at - Homepage
Cited by
Cited by
{WHYPER}: Towards automating risk assessment of mobile applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
22nd USENIX Security Symposium (USENIX Security 13), 527-542, 2013
Inferring method specifications from natural language API descriptions
R Pandita, X Xiao, H Zhong, T Xie, S Oney, A Paradkar
2012 34th international conference on software engineering (ICSE), 815-825, 2012
Mapping the field of software life cycle security metrics
P Morrison, D Moye, R Pandita, L Williams
Information and Software Technology 102, 146-159, 2018
Guided test generation for coverage criteria
R Pandita, T Xie, N Tillmann, J De Halleux
2010 IEEE international conference on software maintenance, 1-10, 2010
Are vulnerabilities discovered and resolved like other defects?
PJ Morrison, R Pandita, X Xiao, R Chillarege, L Williams
Proceedings of the 40th International Conference on Software Engineering …, 2018
A cross-tool communication study on program analysis tool notifications
B Johnson, R Pandita, J Smith, D Ford, S Elder, E Murphy-Hill, ...
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
Discovering likely mappings between APIs using text mining
R Pandita, RP Jetley, SD Sudarsan, L Williams
2015 IEEE 15th International Working Conference on Source Code Analysis and …, 2015
A conceptual framework for engineering chatbots
PR Telang, AK Kalia, M Vukovic, R Pandita, MP Singh
IEEE Internet Computing 22 (6), 54-59, 2018
A tale from the trenches: cognitive biases and software development
S Chattopadhyay, N Nelson, A Au, N Morales, C Sanchez, R Pandita, ...
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
Security misconfigurations in open source kubernetes manifests: An empirical study
A Rahman, SI Shamim, DB Bose, R Pandita
ACM Transactions on Software Engineering and Methodology 32 (4), 1-36, 2023
Latent patterns in activities: A field study of how developers manage context
S Chattopadhyay, N Nelson, YR Gonzalez, AA Leon, R Pandita, A Sarma
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
Icon: Inferring temporal constraints from natural language api descriptions
R Pandita, K Taneja, L Williams, T Tung
2016 IEEE international conference on software maintenance and evolution …, 2016
Bespoke tools: adapted to the concepts developers know
B Johnson, R Pandita, E Murphy-Hill, S Heckman
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
Enabling forensics by proposing heuristics to identify mandatory log events
J King, R Pandita, L Williams
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-11, 2015
Literature review of testing techniques for medical device software
JJ Majikes, R Pandita, T Xie
Proceedings of the 4th Medical Cyber-Physical Systems Workshop (MCPS’13 …, 2013
Tmap: Discovering relevant api methods through text mining of api documentation
R Pandita, R Jetley, S Sudarsan, T Menzies, L Williams
Journal of Software: Evolution and Process 29 (12), e1845, 2017
Veteran developers' contributions and motivations: An open source perspective
P Morrison, R Pandita, E Murphy-Hill, A McLaughlin
2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2016
Contemporary COBOL: Developers' perspectives on defects and defect location
A Ciborowska, A Chakarov, R Pandita
2021 IEEE International Conference on Software Maintenance and Evolution …, 2021
No half-measures: A study of manual and tool-assisted end-user programming tasks in Excel
R Pandita, C Parnin, F Hermans, E Murphy-Hill
2018 ieee symposium on visual languages and human-centric computing (vl/hcc …, 2018
Improving Mobile Application Security via Bridging User Expectations and Application Behaviors.
W Yang, X Xiao, R Pandita, W Enck, T Xie
ACM Symposium and Bootcamp on the Science of Security (HotSoS), 2014
The system can't perform the operation now. Try again later.
Articles 1–20