Challenges with applying vulnerability prediction models P Morrison, K Herzig, B Murphy, L Williams Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-9, 2015 | 82 | 2015 |
Is programming knowledge related to age? an exploration of stack overflow P Morrison, E Murphy-Hill 2013 10th Working Conference on Mining Software Repositories (MSR), 69-72, 2013 | 68 | 2013 |
Approximating attack surfaces with stack traces C Theisen, K Herzig, P Morrison, B Murphy, L Williams 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 51 | 2015 |
Stat! an interactive analytics environment for big data M Barnett, B Chandramouli, R DeLine, S Drucker, D Fisher, J Goldstein, ... Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013 | 44 | 2013 |
The credentials pattern P Morrison, EB Fernandez Proceedings of the 2006 conference on Pattern languages of programs, 1-4, 2006 | 29 | 2006 |
What questions do programmers ask about configuration as code? A Rahman, A Partho, P Morrison, L Williams Proceedings of the 4th International Workshop on Rapid Continuous Software …, 2018 | 20 | 2018 |
Securing the Broker Pattern. P Morrison, EB Fernandez EuroPLoP, 513-530, 2006 | 20 | 2006 |
Mapping the field of software life cycle security metrics P Morrison, D Moye, R Pandita, L Williams Information and Software Technology 102, 146-159, 2018 | 19 | 2018 |
Are vulnerabilities discovered and resolved like other defects? PJ Morrison, R Pandita, X Xiao, R Chillarege, L Williams Empirical Software Engineering 23 (3), 1383-1421, 2018 | 14 | 2018 |
Surveying security practice adherence in software development P Morrison, BH Smith, L Williams Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017 | 13 | 2017 |
Is programming knowledge related to age? P Morrison, E Murphy-Hill Companion to the Working Conference on Mining Software Repositories, 1-4, 2013 | 9 | 2013 |
Mapping the field of software security metrics P Morrison, D Moye, LA Williams North Carolina State University. Dept. of Computer Science, 2014 | 8 | 2014 |
A security practices evaluation framework P Morrison 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 7 | 2015 |
Measuring security practice use: A case study at IBM P Morrison, BH Smith, L Williams 2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in …, 2017 | 5 | 2017 |
Proposing regulatory-driven automated test suites for electronic health record systems P Morrison, C Holmgreen, A Massey, L Williams 2013 5th International Workshop on Software Engineering in Health Care (SEHC …, 2013 | 5 | 2013 |
Proposing Regulatory-Driven Automated Test Suites P Morrison, C Holmgreen, A Massey, L Williams 2013 Agile Conference, 11-21, 2013 | 4 | 2013 |
Testing and continuous integration at scale: limits, costs, and expectations K Herzig Proceedings of the 11th International Workshop on Search-Based Software …, 2018 | 2 | 2018 |
Identifying security issues in software development: are keywords enough? P Morrison, TD Oyetoyan, L Williams Proceedings of the 40th International Conference on Software Engineering …, 2018 | 2 | 2018 |
A Security Practices Evaluation Framework. PJ Morrison | 1 | 2017 |
Veteran developers' contributions and motivations: An open source perspective P Morrison, R Pandita, E Murphy-Hill, A McLaughlin 2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2016 | 1 | 2016 |