


Остановите войну!
for scientists:


default search action
Laurie A. Williams
Person information

- affiliation: North Carolina State University, Raleigh, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j80]Md. Rayhanur Rahman
, Rezvan Mahdavi-Hezaveh
, Laurie A. Williams
:
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. ACM Comput. Surv. 55(12): 241:1-241:36 (2023) - [j79]Carl E. Landwehr
, Michael K. Reiter
, Laurie A. Williams
, Gene Tsudik
, Trent Jaeger
, Tadayoshi Kohno
, Apu Kapadia
:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j78]Nusrat Zahan
, Elizabeth Lin
, Mahzabin Tamanna, William Enck
, Laurie A. Williams
:
Software Bills of Materials Are Required. Are We There Yet? IEEE Secur. Priv. 21(2): 82-88 (2023) - [j77]Nasif Imtiaz
, Aniqa Khanom, Laurie A. Williams
:
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages. IEEE Trans. Software Eng. 49(4): 1540-1560 (2023) - [c191]Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie A. Williams:
Do Software Security Practices Yield Fewer Vulnerabilities? ICSE-SEIP 2023: 292-303 - [c190]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? ICSE 2023: 1635-1647 - [c189]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
SecretBench: A Dataset of Software Secrets. MSR 2023: 347-351 - [i35]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? CoRR abs/2301.12377 (2023) - [i34]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
SecretBench: A Dataset of Software Secrets. CoRR abs/2303.06729 (2023) - [i33]Nasif Imtiaz, Preya Shabrina, Laurie A. Williams:
Trusting code in the wild: A social network-based centrality rating for developers in the Rust ecosystem. CoRR abs/2306.00240 (2023) - [i32]Setu Kumar Basak, Jamison Cox, Bradley Reaves, Laurie A. Williams:
A Comparative Study of Software Secrets Reporting by Secret Detection Tools. CoRR abs/2307.00714 (2023) - [i31]Mindy Tran, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. CoRR abs/2307.15642 (2023) - [i30]Trevor Dunlap, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. CoRR abs/2307.16557 (2023) - [i29]William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-06: Government Secure Supply Chain Summit. CoRR abs/2308.06850 (2023) - 2022
- [j76]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies
:
Omni: automated ensemble with unexpected models against adversarial evasion attack. Empir. Softw. Eng. 27(1): 26 (2022) - [j75]Md. Rayhanur Rahman
, Nasif Imtiaz, Margaret-Anne D. Storey, Laurie A. Williams:
Why secret detection tools are not enough: It's not just about false positives - An industrial case study. Empir. Softw. Eng. 27(3): 59 (2022) - [j74]Sarah Elder
, Nusrat Zahan
, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie A. Williams:
Do I really need all this work to find vulnerabilities? Empir. Softw. Eng. 27(6): 154 (2022) - [j73]William Enck, Laurie A. Williams:
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations. IEEE Secur. Priv. 20(2): 96-100 (2022) - [j72]Laurie A. Williams
:
Trusting Trust: Humans in the Software Supply Chain Loop. IEEE Secur. Priv. 20(5): 7-10 (2022) - [j71]Charles Weir
, Sammy Migues, Laurie A. Williams
:
Exploring the Shift in Security Responsibility. IEEE Secur. Priv. 20(6): 8-17 (2022) - [j70]Rezvan Mahdavi-Hezaveh
, Nirav Ajmeri
, Laurie A. Williams:
Feature toggles as code: Heuristics and metrics for structuring feature toggles. Inf. Softw. Technol. 145: 106813 (2022) - [c188]Nusrat Zahan, Thomas Zimmermann, Patrice Godefroid, Brendan Murphy, Chandra Shekhar Maddila, Laurie A. Williams:
What are Weak Links in the npm Supply Chain? ICSE (SEIP) 2022: 331-340 - [c187]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue. MSR 2022: 144-155 - [c186]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What are the Practices for Secret Management in Software Artifacts? SecDev 2022: 69-76 - [i28]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue. CoRR abs/2203.11410 (2022) - [i27]Rui Shu, Tianpei Xia, Huy Tu, Laurie A. Williams, Tim Menzies:
Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning). CoRR abs/2205.00665 (2022) - [i26]Nasif Imtiaz, Laurie A. Williams:
Phantom Artifacts & Code Review Coverage in Dependency Updates. CoRR abs/2206.09422 (2022) - [i25]Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie A. Williams:
Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application. CoRR abs/2208.01595 (2022) - [i24]Nusrat Zahan
, Parth Kanakiya, Brian Hambleton, Shohanuzzaman Shohan, Laurie A. Williams:
PREPRINT: Can the OpenSSF Scorecard be used to measure the security posture of npm and PyPI? CoRR abs/2208.03412 (2022) - [i23]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What are the Practices for Secret Management in Software Artifacts? CoRR abs/2208.11280 (2022) - [i22]Md. Rayhanur Rahman
, Laurie A. Williams:
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts. CoRR abs/2210.02601 (2022) - [i21]Nusrat Zahan
, Shohanuzzaman Shohan, Dan Harris, Laurie A. Williams:
PREPRINT: Do OpenSSF Scorecard Practices Contribute to Fewer Vulnerabilities? CoRR abs/2210.14884 (2022) - [i20]Md. Rayhanur Rahman
, Laurie A. Williams:
Investigating co-occurrences of MITRE ATT\&CK Techniques. CoRR abs/2211.06495 (2022) - [i19]Md. Rayhanur Rahman
, Laurie A. Williams:
An investigation of security controls and MITRE ATT&CK techniques. CoRR abs/2211.06500 (2022) - [i18]Rezvan Mahdavi-Hezaveh, Sameeha Fatima, Laurie A. Williams:
An Extended Model of Software Configuration. CoRR abs/2212.00505 (2022) - 2021
- [j69]Rezvan Mahdavi-Hezaveh
, Jacob Dremann, Laurie A. Williams:
Software development with feature toggles: practices used by practitioners. Empir. Softw. Eng. 26(1): 1 (2021) - [j68]Rui Shu, Tianpei Xia, Jianfeng Chen, Laurie A. Williams, Tim Menzies
:
How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization). Empir. Softw. Eng. 26(3): 53 (2021) - [j67]Laurie A. Williams:
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]. IEEE Secur. Priv. 19(3): 4-7 (2021) - [j66]Akond Rahman
, Laurie A. Williams
:
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts. IEEE Secur. Priv. 19(3): 33-41 (2021) - [j65]Akond Rahman
, Md. Rayhanur Rahman
, Chris Parnin, Laurie A. Williams:
Security Smells in Ansible and Chef Scripts: A Replication Study. ACM Trans. Softw. Eng. Methodol. 30(1): 3:1-3:31 (2021) - [j64]Zhe Yu
, Christopher Theisen, Laurie A. Williams
, Tim Menzies
:
Improving Vulnerability Inspection Efficiency Using Active Learning. IEEE Trans. Software Eng. 47(11): 2401-2420 (2021) - [c185]Nasif Imtiaz, Seaver Thorn, Laurie A. Williams:
A comparative study of vulnerability reporting by software composition analysis tools. ESEM 2021: 5:1-5:11 - [c184]Sarah Elder, Nusrat Zahan
, Valeri Kozarev, Rui Shu, Tim Menzies, Laurie A. Williams:
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard. ICSE (SEET) 2021: 95-104 - [c183]Saikath Bhattacharya, Munindar P. Singh, Laurie A. Williams:
Software Security Readiness and Deployment. ISSRE Workshops 2021: 298-299 - [c182]Charles Weir
, Sammy Migues, Mike Ware, Laurie A. Williams:
Infiltrating security into development: exploring the world's largest software security study. ESEC/SIGSOFT FSE 2021: 1326-1336 - [i17]Sarah Elder, Nusrat Zahan, Val Kozarev, Rui Shu, Tim Menzies, Laurie A. Williams:
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard. CoRR abs/2103.05088 (2021) - [i16]Nasif Imtiaz, Laurie A. Williams:
Memory Error Detection in Security Testing. CoRR abs/2104.04385 (2021) - [i15]Nasif Imtiaz, Seaver Thorn, Laurie A. Williams:
A Comparative Study of Vulnerability Reporting by Software Composition Analysis Tools. CoRR abs/2108.12078 (2021) - [i14]Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey. CoRR abs/2109.06808 (2021) - [i13]Nasif Imtiaz, Aniqa Khanom, Laurie A. Williams:
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages. CoRR abs/2112.06804 (2021) - [i12]Nusrat Zahan, Laurie A. Williams, Thomas Zimmermann, Patrice Godefroid, Brendan Murphy, Chandra Shekhar Maddila:
What are Weak Links in the npm Supply Chain? CoRR abs/2112.10165 (2021) - 2020
- [j63]Hui Guo
, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh
:
Çorba: crowdsourcing to obtain requirements from regulations and breaches. Empir. Softw. Eng. 25(1): 532-561 (2020) - [j62]Akond Rahman
, Effat Farhana, Laurie A. Williams:
The 'as code' activities: development anti-patterns for infrastructure as code. Empir. Softw. Eng. 25(5): 3430-3467 (2020) - [j61]Christopher Theisen, Laurie A. Williams:
Better together: Comparing vulnerability prediction models. Inf. Softw. Technol. 119 (2020) - [j60]Mehdi Mirakhorli, Matthias Galster, Laurie A. Williams:
Understanding Software Security from Design to Deployment. ACM SIGSOFT Softw. Eng. Notes 45(2): 25-26 (2020) - [c181]Md. Rayhanur Rahman
, William Enck, Laurie A. Williams:
Do configuration management tools make systems more secure?: an empirical research plan. HotSoS 2020: 23:1-23:2 - [c180]Md. Rayhanur Rahman
, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts. ICDM (Workshops) 2020: 516-525 - [c179]Akond Rahman, Effat Farhana, Chris Parnin, Laurie A. Williams:
Gang of eight: a defect taxonomy for infrastructure as code scripts. ICSE 2020: 752-764 - [i11]Akond Rahman, Effat Farhana, Laurie A. Williams:
The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code. CoRR abs/2006.00177 (2020) - [i10]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack. CoRR abs/2011.12720 (2020)
2010 – 2019
- 2019
- [j59]Laurie A. Williams:
Science Leaves Clues. IEEE Secur. Priv. 17(5): 4-6 (2019) - [j58]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie A. Williams:
Collaborative security risk estimation in agile software development. Inf. Comput. Secur. 27(4) (2019) - [j57]Akond Rahman
, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
A systematic mapping study of infrastructure as code research. Inf. Softw. Technol. 108: 65-77 (2019) - [j56]Akond Rahman
, Laurie A. Williams:
Source code properties of defective infrastructure as code scripts. Inf. Softw. Technol. 112: 148-163 (2019) - [c178]Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie A. Williams, Andrew Meneely:
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition. ESEM 2019: 1-6 - [c177]Akond Rahman, Laurie A. Williams:
A bird's eye view of knowledge needs related to penetration testing. HotSoS 2019: 9:1-9:2 - [c176]Nasif Imtiaz, Laurie A. Williams:
A synopsis of static analysis alerts on open source software. HotSoS 2019: 12:1-12:3 - [c175]Akond Rahman, Chris Parnin, Laurie A. Williams:
The seven sins: security smells in infrastructure as code scripts. ICSE 2019: 164-175 - [c174]Md. Rayhanur Rahman
, Akond Rahman, Laurie A. Williams:
Share, But be Aware: Security Smells in Python Gists. ICSME 2019: 536-540 - [c173]Nasif Imtiaz, Brendan Murphy, Laurie A. Williams:
How Do Developers Act on Static Analysis Alerts? An Empirical Study of Coverity Usage. ISSRE 2019: 323-333 - [c172]Nasif Imtiaz, Akond Rahman, Effat Farhana, Laurie A. Williams:
Challenges with responding to static analysis tool alerts. MSR 2019: 245-249 - [i9]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Better Security Bug Report Classification via Hyperparameter Optimization. CoRR abs/1905.06872 (2019) - [i8]Rezvan Mahdavi-Hezaveh, Jacob Dremann, Laurie A. Williams:
Feature Toggle Driven Development: Practices usedby Practitioners. CoRR abs/1907.06157 (2019) - [i7]Akond Rahman, Md. Rayhanur Rahman, Chris Parnin, Laurie A. Williams:
Security Smells in Infrastructure as Code Scripts. CoRR abs/1907.07159 (2019) - [i6]Rui Shu, Tianpei Xia, Jianfeng Chen, Laurie A. Williams, Tim Menzies:
Improved Recognition of Security Bugs via Dual Hyperparameter Optimization. CoRR abs/1911.02476 (2019) - 2018
- [j55]Patrick Morrison
, Rahul Pandita, Xusheng Xiao
, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? Empir. Softw. Eng. 23(3): 1383-1421 (2018) - [j54]Patrick Morrison
, David Moye, Rahul Pandita, Laurie A. Williams:
Mapping the field of software life cycle security metrics. Inf. Softw. Technol. 102: 146-159 (2018) - [j53]Christopher Theisen, Nuthan Munaiah, Mahran Al-Zyoud, Jeffrey C. Carver
, Andrew Meneely, Laurie A. Williams:
Attack surface definitions: A systematic literature review. Inf. Softw. Technol. 104: 94-103 (2018) - [j52]Laurie A. Williams, Gary McGraw, Sammy Migues:
Engineering Security Vulnerability Prevention, Detection, and Response. IEEE Softw. 35(5): 76-80 (2018) - [c171]Sarah Elder, Anna Mattapallil, Laurie A. Williams:
A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER. HotSoS 2018: 13:1 - [c170]Christopher Theisen, Laurie A. Williams:
How bad is it, really? an analysis of severity scores for vulnerabilities: poster. HotSoS 2018: 20:1 - [c169]Hui Guo
, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh:
Toward extraction of security requirements from text: poster. HotSoS 2018: 27:1 - [c168]Laurie A. Williams:
Continuously integrating security. SEAD@ICSE 2018: 1-2 - [c167]Akond Rahman, Asif Partho, Patrick Morrison, Laurie A. Williams:
What questions do programmers ask about configuration as code? RCoSE@ICSE 2018: 16-22 - [c166]Akond Rahman, Jonathan Stallings
, Laurie A. Williams:
Defect prediction metrics for infrastructure as code scripts in DevOps. ICSE (Companion Volume) 2018: 414-415 - [c165]Patrick Morrison, Tosin Daniel Oyetoyan, Laurie A. Williams:
Identifying security issues in software development: are keywords enough? ICSE (Companion Volume) 2018: 426-427 - [c164]Patrick J. Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? ICSE 2018: 498 - [c163]Akond Rahman, Laurie A. Williams:
Characterizing Defective Configuration Scripts Used for Continuous Deployment. ICST 2018: 34-45 - [c162]Christopher Theisen, Hyunwoo Sohn, Dawson Tripp, Laurie A. Williams:
BP: Profiling Vulnerabilities on the Attack Surface. SecDev 2018: 110-119 - [e9]Munindar P. Singh, Laurie A. Williams, Rick Kuhn, Tao Xie:
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018, Raleigh, North Carolina, USA, April 10-11, 2018. ACM 2018 [contents] - [i5]Zhe Yu, Christopher Theisen, Hyunwoo Sohn, Laurie A. Williams, Tim Menzies:
Cost-aware Vulnerability Prediction: the HARMLESS Approach. CoRR abs/1803.06545 (2018) - [i4]Akond Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
Where Are The Gaps? A Systematic Mapping Study of Infrastructure as Code Research. CoRR abs/1807.04872 (2018) - [i3]Akond Rahman, Sarah Elder, Faysal Hossain Shezan, Vanessa Frost, Jonathan Stallings, Laurie A. Williams:
Categorizing Defects in Infrastructure as Code. CoRR abs/1809.07937 (2018) - [i2]Akond Rahman, Laurie A. Williams:
Source Code Properties of Defective Infrastructure as Code Scripts. CoRR abs/1810.09605 (2018) - 2017
- [j51]Laurie A. Williams, Doug Baldwin:
Highlights of the ACM student research competition. Commun. ACM 60(11): 5 (2017) - [j50]Maria Riaz, Jason Tyler King, John Slankas, Laurie A. Williams, Fabio Massacci
, Christian Quesada-López, Marcelo Jenkins:
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates. Empir. Softw. Eng. 22(4): 2127-2178 (2017) - [j49]Jason Tyler King, Jonathan Stallings
, Maria Riaz, Laurie A. Williams:
To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment. Empir. Softw. Eng. 22(5): 2684-2717 (2017) - [j48]Christopher Theisen, Marcel Dunaiski
, Laurie A. Williams, Willem Visser:
Software Engineering Research at the International Conference on Software Engineering in 2016. ACM SIGSOFT Softw. Eng. Notes 42(4): 1-7 (2017) - [j47]Rahul Pandita
, Raoul Jetley, Sithu D. Sudarsan, Tim Menzies, Laurie A. Williams:
TMAP: Discovering relevant API methods through text mining of API documentation. J. Softw. Evol. Process. 29(12) (2017) - [j46]Chris Parnin, Eric Helms, Chris Atlee, Harley Boughton, Mark Ghattas, Andy Glover, James Holman, John Micco, Brendan Murphy, Tony Savor, Michael Stumm
, Shari Whitaker, Laurie A. Williams:
The Top 10 Adages in Continuous Deployment. IEEE Softw. 34(3): 86-95 (2017) - [c161]Christopher Theisen, Ted Zhu, Kevin M. Oliver, Laurie A. Williams:
Teaching Secure Software Development Through an Online Course. SecSE@ESORICS 2017: 19-33 - [c160]Morgan Burcham, Mahran Al-Zyoud, Jeffrey C. Carver, Mohammed Noraden Alsaleh, Hongying Du, Fida Gillani, Jun Jiang, Akond Rahman, Özgür Kafali, Ehab Al-Shaer, Laurie A. Williams:
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers. HotSoS 2017: 13-23 - [c159]Patrick Morrison, Benjamin H. Smith, Laurie A. Williams:
Surveying Security Practice Adherence in Software Development. HotSoS 2017: 85-94 - [c158]Patrick Morrison, Benjamin H. Smith, Laurie A. Williams:
Measuring Security Practice Use: A Case Study at IBM. CESI@ICSE 2017: 16-22 - [c157]Akond Rahman, Asif Partho, David Meder, Laurie A. Williams:
Which Factors Influence Practitioners' Usage of Build Automation Tools? RCoSE@ICSE 2017: 20-26 - [c156]Katja Kevic, Brendan Murphy, Laurie A. Williams, Jennifer Beckmann:
Characterizing Experimentation in Continuous Deployment: A Case Study on Bing. ICSE-SEIP 2017: 123-132 - [c155]Akond Rahman, Priysha Pradhan, Asif Partho, Laurie A. Williams:
Predicting Android Application Security and Privacy Risk with Static Code Metrics. MOBILESoft@ICSE 2017: 149-153 - [c154]Christopher Theisen, Kim Herzig, Brendan Murphy, Laurie A. Williams:
Risk-Based Attack Surface Approximation: How Much Data Is Enough? ICSE-SEIP 2017: 273-282 - [c153]Christopher Theisen, Marcel Dunaiski
, Laurie A. Williams, Willem Visser:
Writing good software engineering research papers: revisited. ICSE (Companion Volume) 2017: 402 - [c152]Özgür Kafali, Jasmine Jones, Megan Petruso, Laurie A. Williams, Munindar P. Singh
:
How good is a security policy against real breaches?: a HIPAA case study. ICSE 2017: 530-540 - [c151]Mahran Al-Zyoud, Laurie A. Williams, Jeffrey C. Carver:
Step One Towards Science of Security. SafeConfig@CCS 2017: 31-35 - [c150]Laurie A. Williams:
The rising tide lifts all boats: the advancement of science in cyber security (invited talk). ESEC/SIGSOFT FSE 2017: 1 - [c149]Laurie A. Williams:
Building forensics in: supporting the investigation of digital criminal activities (invited talk). SERF@ESEC/SIGSOFT FSE 2017: 1 - [e8]Michaela Huhn, Laurie A. Williams:
Software Engineering in Health Care - 4th International Symposium, FHIES 2014, and 6th International Workshop, SEHC 2014, Washington, DC, USA, July 17-18, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9062, Springer 2017, ISBN 978-3-319-63193-6 [contents] - 2016
- [j45]Hanan Hibshi, Travis D. Breaux, Maria Riaz, Laurie A. Williams:
A grounded analysis of experts' decision-making during security assessments. J. Cybersecur. 2(2): 147-163 (2016) - [c148]Maria Riaz, Jonathan Stallings
, Munindar P. Singh, John Slankas, Laurie A. Williams:
DIGS: A Framework for Discovering Goals for Security Requirements Engineering. ESEM 2016: 35:1-35:10 - [c147]Jeffrey C. Carver, Morgan Burcham, Sedef Akinli Koçak, Ayse Bener
, Michael Felderer, Matthias Gander, Jason King, Jouni Markkula, Markku Oivo, Clemens Sauerwein, Laurie A. Williams:
Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings. HotSoS 2016: 38-51 - [c146]Özgür Kafali, Munindar P. Singh
, Laurie A. Williams:
Toward a normative approach for forensicability. HotSoS 2016: 65-67 - [c145]Akond Ashfaque Ur Rahman, Laurie A. Williams:
Security practices in DevOps. HotSoS 2016: 109-111 - [c144]Christopher Theisen, Laurie A. Williams:
Risk-based attack surface approximation: poster.