Hidden in plain sight: Automatically identifying security requirements from natural language artifacts M Riaz, J King, J Slankas, L Williams 2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014 | 95 | 2014 |
Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms JT King, B Smith, L Williams Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012 | 49 | 2012 |
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams Proceedings of the second annual workshop on Security and privacy in medical …, 2010 | 47 | 2010 |
Developing software engineering skills using real tools for automated grading S Heckman, J King Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018 | 45 | 2018 |
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates M Riaz, J King, J Slankas, L Williams, F Massacci, C Quesada-López, ... Empirical Software Engineering, 1-52, 0 | 27 | |
Using templates to elicit implied security requirements from functional requirements-a controlled experiment M Riaz, J Slankas, J King, L Williams Proceedings of the 8th ACM/IEEE International Symposium on Empirical …, 2014 | 26 | 2014 |
Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings JC Carver, M Burcham, SA Kocak, A Bener, M Felderer, M Gander, J King, ... Proceedings of the Symposium and Bootcamp on the Science of Security, 38-51, 2016 | 22 | 2016 |
Log your CRUD: design principles for software logging mechanisms J King, L Williams Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 5, 2014 | 20 | 2014 |
To log, or not to log: using heuristics to identify mandatory log events–a controlled experiment J King, J Stallings, M Riaz, L Williams Empirical Software Engineering, 1-34, 2016 | 19 | 2016 |
Enabling forensics by proposing heuristics to identify mandatory log events J King, R Pandita, L Williams Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 6, 2015 | 18 | 2015 |
Measuring the forensic-ability of audit logs for nonrepudiation J King Proceedings of the 2013 International Conference on Software Engineering …, 2013 | 11 | 2013 |
Integrating testing throughout the cs curriculum S Heckman, JY Schmidt, J King 2020 IEEE International Conference on Software Testing, Verification and …, 2020 | 7 | 2020 |
Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems} J King, L Williams Presented as part of the 2013 USENIX Workshop on Health Information …, 2013 | 6 | 2013 |
Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse J King, B Smith, L Williams International Journal of Computational Models and Algorithms in Medicine …, 2012 | 5 | 2012 |
Secure logging and auditing in electronic health records systems: what can we learn from the payment card industry J King, L Williams Proceedings of the 3rd USENIX conference on Health Security and Privacy, 13-13, 2012 | 4 | 2012 |
Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report J King Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021 | 3 | 2021 |
Teaching Software Engineering Skills in CS1. 5: Incorporating Real-world Practices and Tools S Heckman, J King Proceedings of the 47th ACM Technical Symposium on Computing Science …, 2016 | 3 | 2016 |
Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework S Heckman, J King, M Winters Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015 | 3 | 2015 |
Discovering security requirements from natural language project artifacts J Slankas, M Riaz, J King, LA Williams North Carolina State University. Dept. of Computer Science, 2013 | 2 | 2013 |
Measuring the Forensic-ability of User Activity Logs. JT King | 1 | 2015 |