Laurie Williams
#105,410
Most Influential Person Now
American software engineer
Laurie Williams 's AcademicInfluence.com Rankings
Laurie Williams computer-science Degrees
Computer Science
#4191
World Rank
#4411
Historical Rank
Programming
#65
World Rank
#68
Historical Rank
Computer Graphics
#119
World Rank
#122
Historical Rank
Software Engineering
#136
World Rank
#136
Historical Rank
Download Badge
Computer Science
Laurie Williams 's Degrees
- Bachelors Computer Science Stanford University
- PhD Computer Science Carnegie Mellon University
Similar Degrees You Can Earn
Why Is Laurie Williams Influential?
(Suggest an Edit or Addition)According to Wikipedia, Laurie Williams is an American software engineer known for her writings on pair programming and agile software development. She is a distinguished professor of computer science at North Carolina State University, and interim head of the Department of Computer Science at North Carolina State University.
Laurie Williams 's Published Works
Published Works
- Strengthening the Case for Pair Programming (2000) (859)
- The costs and benefits of pair programming (2001) (558)
- Pair Programming Illuminated (2002) (506)
- Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities (2011) (490)
- Agile software development: it's about feedback and change (2003) (429)
- Improving the CS1 experience with pair programming (2003) (350)
- Empirical Findings in Agile Methods (2002) (314)
- All I really need to know about pair programming I learned in kindergarten (2000) (313)
- Essential communication practices for Extreme Programming in a global software development team (2006) (283)
- On the value of static analysis for fault detection in software (2006) (272)
- In Support of Pair Programming in the Introductory Computer Science Course (2002) (263)
- Predicting failures with developer networks and social network analysis (2008) (249)
- Assessing test-driven development at IBM (2003) (243)
- A structured experiment of test-driven development (2004) (222)
- System test case prioritization of new and regression test cases (2005) (221)
- Test-driven development as a defect-reduction practice (2003) (212)
- In support of student pair-programming (2001) (208)
- An initial investigation of test driven development in industry (2003) (189)
- Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista (2010) (180)
- What agile teams think of agile principles (2012) (171)
- Can traditional fault prediction models be used for vulnerability prediction? (2013) (162)
- Realizing quality improvement through test driven development: results and experiences of four industrial teams (2008) (152)
- Exploring extreme programming in context: an industrial case study (2004) (149)
- An empirical model to predict security vulnerabilities using code complexity metrics (2008) (146)
- The effects of "pair-pressure" and "pair-learning" on software engineering education (2000) (132)
- One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques (2011) (132)
- A systematic literature review of actionable alert identification techniques for automated static code analysis (2011) (130)
- Continuous Deployment at Facebook and OANDA (2016) (130)
- On understanding compatibility of student pair programmers (2004) (130)
- Building pair programming knowledge through a family of experiments (2003) (128)
- Experiments with Industry's “Pair-Programming” Model in the Computer Science Classroom (2001) (125)
- Agile Software Development Methodologies and Practices (2010) (122)
- Is complexity really the enemy of software security? (2008) (119)
- Secure open source collaboration: an empirical study of linus' law (2009) (119)
- On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques (2008) (104)
- The collaborative software process(sm) (2000) (104)
- The Collaborative Software Process (1999) (99)
- Motivations and measurements in an agile case study (2004) (99)
- Challenges with applying vulnerability prediction models (2015) (97)
- Automated extraction of non-functional requirements in available documentation (2013) (94)
- On automated prepared statement generation to remove SQL injection vulnerabilities (2009) (92)
- Extreme Programming Perspectives (2002) (92)
- Sangam: a distributed pair programming plug-in for Eclipse (2004) (91)
- Extreme Programming and Agile Methods — XP/Agile Universe 2002 (2002) (91)
- Validating software metrics: A spectrum of philosophies (2012) (91)
- The Seven Sins: Security Smells in Infrastructure as Code Scripts (2019) (89)
- Toward a framework for evaluating extreme programming (2004) (88)
- Virtual Teaming: Experiments and Experiences with Distributed Pair Programming (2003) (87)
- Have Agile Techniques been the Silver Bullet for Software Development at Microsoft? (2013) (84)
- Integrating pair programming into a software development process (2001) (83)
- Examining the compatibility of student pair programmers (2006) (82)
- Voices of women in a software engineering course: reflections on collaboration (2004) (82)
- Socio-technical developer networks: should we trust our measurements? (2011) (81)
- Prioritizing software security fortification throughcode-level metrics (2008) (81)
- Using Automated Fix Generation to Secure SQL Statements (2007) (78)
- Personality types, learning styles, and an agile approach to software engineering education (2006) (78)
- A Model Building Process for Identifying Actionable Static Analysis Alerts (2009) (78)
- Note to self: make assignments meaningful (2007) (76)
- Eleven Guidelines for Implementing Pair Programming in the Classroom (2008) (74)
- Synthesizing Continuous Deployment Practices Used in Software Development (2015) (74)
- Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change Records (2007) (72)
- Preliminary Analysis of the Effects of Pair Programming on Job Satisfaction (2001) (71)
- Hidden in plain sight: Automatically identifying security requirements from natural language artifacts (2014) (68)
- Evolving beyond requirements creep: a risk-based evolutionary prototyping model (2001) (67)
- Protection Poker: The New Software Security "Game"; (2010) (65)
- On guiding the augmentation of an automated test suite via mutation analysis (2009) (65)
- The Top 10 Adages in Continuous Deployment (2017) (64)
- Matching attack patterns to security vulnerabilities in software-intensive system designs (2005) (64)
- Software Security in DevOps: Synthesizing Practitioners’ Perceptions and Practices (2016) (63)
- An Empirical Evaluation of the MuJava Mutation Operators (2007) (63)
- Towards increasing the compatibility of student pair programmers (2005) (62)
- Applying regression test selection for COTS-based applications (2006) (62)
- Where Are The Gaps? A Systematic Mapping Study of Infrastructure as Code Research (2018) (61)
- On the Sustained Use of a Test-Driven Development Practice at IBM (2007) (60)
- On agile performance requirements specification and testing (2006) (56)
- Approximating Attack Surfaces with Stack Traces (2015) (55)
- Extreme programming evaluation framework for object-oriented languages -- version 1.1 (2003) (55)
- Early estimation of software quality using in-process testing metrics: a controlled case study (2005) (53)
- Perspectives on Data Science for Software Engineering (2016) (53)
- Empirical Software Change Impact Analysis using Singular Value Decomposition (2008) (53)
- Extreme programming for software engineering education? (2001) (52)
- Strengthening the empirical analysis of the relationship between Linus' Law and software security (2010) (50)
- The Economics of Software Development by Pair Programmers (2003) (49)
- On the Effectiveness of Unit Test Automation at Microsoft (2009) (49)
- Toward Reducing Fault Fix Time: Understanding Developer Behavior for the Design of Automated Fault Detection Tools (2007) (48)
- Characterizing Experimentation in Continuous Deployment: A Case Study on Bing (2017) (47)
- SQLUnitGen: Test Case Generation for SQL Injection Detection (2006) (47)
- An initial exploration of the relationship between pair programming and Brooks' law (2004) (47)
- Requirements-Based Test Case Prioritization (2004) (47)
- Preliminary results on using static analysis tools for software inspection (2004) (45)
- Pair Programming in an Introductory Computer Science Course: Initial Results and Recommendations (2002) (45)
- Characterizing Defective Configuration Scripts Used for Continuous Deployment (2018) (45)
- An initial study on the use of execution complexity metrics as indicators of software vulnerabilities (2011) (45)
- Scrum + Engineering Practices: Experiences of Three Microsoft Teams (2011) (44)
- Exploring Pair Programming in Distributed Object-Oriented Team Projects (2002) (44)
- On the economics of requirements-based test case prioritization (2005) (44)
- Adapting extreme programming for a core software engineering course (2002) (43)
- Driving Process Improvement via Comparative Agility Assessment (2010) (43)
- Lessons learned from seven years of pair programming at North Carolina State University (2007) (42)
- Relation extraction for inferring access control rules from natural language artifacts (2014) (41)
- The xp programmer: the few-minutes programmer (2003) (41)
- Patient-Centered Communication in Cancer Care: The Role of the NCI’s Cancer Information Service (2011) (40)
- Towards the prioritization of system test cases (2014) (39)
- A comparison of the efficiency and effectiveness of vulnerability discovery techniques (2013) (39)
- On pair rotation in the computer science course (2004) (37)
- Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms (2012) (37)
- Undergraduate student perceptions of pair programming and agile software methodologies: verifying a model of social interaction (2005) (36)
- A software testing and reliability early warning (strew) metric suite (2005) (35)
- Providing test quality feedback using static source code and automatic test suite metrics (2005) (35)
- Integrating agile practices into software engineering courses (2002) (35)
- Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected (2010) (34)
- Engineering Security Vulnerability Prevention, Detection, and Response (2018) (34)
- On the design of more secure software-intensive systems by use of attack patterns (2007) (34)
- On preparing students for distributed software development with a synchronous, collaborative development platform (2009) (34)
- Regression Test Selection for Black-box Dynamic Link Library Components (2007) (33)
- On the Impact of a Collaborative Pedagogy on African American Millennial Students in Software Engineering (2007) (33)
- Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (2011) (33)
- Incorporating Performance Testing in Test-Driven Development (2007) (33)
- Should software testers use mutation analysis to augment a test set? (2009) (32)
- How have we evaluated software pattern application? A systematic mapping study of research design practices (2015) (32)
- Predicting Attack-prone Components (2009) (32)
- Pair Programming (2010) (32)
- Mapping the field of software life cycle security metrics (2018) (31)
- Toward Non-security Failures as a Predictor of Security Faults and Failures (2009) (31)
- What Questions Do Programmers Ask about Configuration as Code? (2018) (31)
- Toward the Use of Automated Static Analysis Alerts for Early Identification of Vulnerability- and Attack-prone Components (2007) (31)
- Towards a Metric Suite for Early Software Reliability Assessment (2003) (31)
- Debunking the nerd stereotype with pair programming (2006) (31)
- Improving Vulnerability Inspection Efficiency Using Active Learning (2018) (31)
- An Empirical Study on the Relation between Dependency Neighborhoods and Failures (2011) (30)
- Source Code Properties of Defective Infrastructure as Code Scripts (2018) (30)
- Challenges with Responding to Static Analysis Tool Alerts (2019) (29)
- Pair Learning: With an Eye Toward Future Success (2003) (29)
- Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts (2020) (28)
- Distributed Pair Programming: Empirical Studies and Supporting Environments (2002) (28)
- What are Weak Links in the npm Supply Chain? (2021) (27)
- Are vulnerabilities discovered and resolved like other defects? (2018) (27)
- ROSE: a repository of education-friendly open-source projects (2008) (26)
- Early estimation of software quality using in-process testing metrics (2005) (26)
- Security requirements patterns: understanding the science behind the art of pattern writing (2012) (26)
- Personas: moving beyond role-based requirements engineering (2006) (26)
- Security Smells in Ansible and Chef Scripts: A Replication Study (2019) (26)
- A survey on code coverage as a stopping criterion for unit testing (2008) (26)
- A (partial) introduction to software engineering practices and methods (2010) (25)
- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer (2009) (25)
- Improving developer activity metrics with issue tracking annotations (2010) (25)
- Attack surface definitions: A systematic literature review (2018) (24)
- Teaching software development methods: the case of extreme programming (2004) (24)
- How Good Is a Security Policy against Real Breaches? A HIPAA Case Study (2017) (24)
- SQLUnitGen: SQL Injection Testing Using Static and Dynamic Analysis (2006) (23)
- Pair Programming in Introductory Programming Labs (2003) (22)
- An initial study of a lightweight process for change identification and regression test selection when source code is not available (2005) (21)
- Which Factors Influence Practitioners' Usage of Build Automation Tools? (2017) (21)
- A lightweight process for change identification and regression test selection in using COTS components (2006) (21)
- Agile Software Development in Practice (2014) (20)
- How Do Developers Act on Static Analysis Alerts? An Empirical Study of Coverity Usage (2019) (20)
- GERT: an empirical reliability estimation and testing feedback tool (2004) (20)
- Using templates to elicit implied security requirements from functional requirements - a controlled experiment (2014) (19)
- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks (2010) (19)
- On the Effective Use of Security Test Patterns (2012) (19)
- Discovering likely mappings between APIs using text mining (2015) (19)
- Identifying the implied: Findings from three differentiated replications on the use of security requirements templates (2017) (19)
- Access Control Policy Extraction from Unconstrained Natural Language Text (2013) (19)
- DIGS: A Framework for Discovering Goals for Security Requirements Engineering (2016) (19)
- Evaluating access control of open source electronic health record systems (2011) (18)
- Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition (2019) (18)
- On the economics of requirements-based test case prioritization (2005) (18)
- Better together: Comparing vulnerability prediction models (2020) (18)
- Experiences in applying agile software development practices in new product development (2004) (17)
- Towards improved security criteria for certification of electronic health record systems (2010) (17)
- A Longitudinal Study of the Use of a Test-Driven Development Practice in Industry (2007) (17)
- Examining the Relationships between Performance Requirements and “Not a Problem” Defect Reports (2008) (16)
- Software development with feature toggles: practices used by practitioners (2019) (16)
- Better Security Bug Report Classification via Hyperparameter Optimization (2019) (16)
- Risk-Based Attack Surface Approximation: How Much Data Is Enough? (2017) (16)
- Predicting Android Application Security and Privacy Risk with Static Code Metrics (2017) (16)
- Early estimation of defect density using an in-process Haskell metrics model (2005) (16)
- A comparative study of vulnerability reporting by software composition analysis tools (2021) (16)
- Log your CRUD: design principles for software logging mechanisms (2014) (16)
- Security Smells in Ansible and Chef Scripts (2021) (15)
- MimEc: intelligent user notification of faults in the eclipse IDE (2008) (15)
- The ‘as code’ activities: development anti-patterns for infrastructure as code (2020) (15)
- Does adding manpower also affect quality?: an empirical, longitudinal analysis (2011) (14)
- Jazz Sangam : A Real-Time Tool for Distributed Pair Programming on a Team Development Platform (2008) (14)
- On the Economic Feasibility of Pair Programming (2002) (14)
- Lab Partners: If They're Good Enough for the Natural Sciences, Why Aren't They Good Enough for Us? (2007) (14)
- How and Why Collaborative Software Development Impacts the Software Engineering Course (2005) (14)
- Examining the impact of pair programming on female students (2004) (14)
- Towards a taxonomy of techniques to detect cross-site scripting and SQL injection vulnerabilities (2008) (13)
- Security practices in DevOps (2016) (13)
- Writing Good Software Engineering Research Papers: Revisited (2017) (13)
- A grounded analysis of experts' decision-making during security assessments (2016) (13)
- ICON: Inferring Temporal Constraints from Natural Language API Descriptions (2016) (13)
- To log, or not to log: using heuristics to identify mandatory log events – a controlled experiment (2017) (13)
- Pallino: automation to support regression test selection for cots-based applications (2007) (13)
- A comparative evaluation of static analysis actionable alert identification techniques (2013) (13)
- Surveying Security Practice Adherence in Software Development (2017) (12)
- Enabling forensics by proposing heuristics to identify mandatory log events (2015) (12)
- Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings (2016) (12)
- But, Isn't That Cheating? (1999) (12)
- Predictive models for identifying software components prone to failure during security attacks (2008) (12)
- Work in Progress: Exploring Security and Privacy Concepts through the Development and Testing of the iTrust Medical Records System (2006) (12)
- Developing software performance with the performance refinement and evolution model (2007) (12)
- Collaboration vs plagiarism in computer science programming courses (2001) (11)
- TMAP: Discovering relevant API methods through text mining of API documentation (2017) (11)
- NANE: Identifying Misuse Cases Using Temporal Norm Enactments (2016) (11)
- Hacker or hero? - extreme programming today (panel session) (2000) (11)
- Using In-Process Testing Metrics to Estimate Post-Release Field Quality (2007) (11)
- Early estimation of defect density using an in-process Haskell metrics model (2005) (11)
- Software Security Education at Scale (2016) (11)
- Systematizing Security Test Planning Using Functional Requirements Phrases (2011) (11)
- Software Development Analytics (Dagstuhl Seminar 14261) (2014) (11)
- Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse (2012) (11)
- An experience report for software quality evaluation in highly iterative development methodology using traditional metrics (2013) (11)
- Ranking Attack-Prone Components with a Predictive Model (2008) (10)
- Software metrics validation criteria: A systematic literature review (2010) (10)
- A process for identifying changes when source code is not available (2005) (10)
- A Video-enhanced Environment for Distributed Extreme Programming (2002) (10)
- A systematic model building process for predicting actionable static analysis alerts (2009) (10)
- Share, But be Aware: Security Smells in Python Gists (2019) (10)
- Using In-Process Metrics to Predict Defect Density in Haskell Programs (2004) (10)
- Identifying fault-prone files using static analysis alerts through singular value decomposition (2007) (10)
- Proposing SQL statement coverage metrics (2008) (10)
- Collaborative security risk estimation in agile software development (2019) (9)
- Distributed Pair Programming (2002) (9)
- EPRAM: Evolutionary Prototyping Risk Analysis & Mitigation (e-Commerce Software Development Process Document) (2001) (9)
- Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems (2013) (9)
- Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements (2016) (9)
- How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization) (2019) (9)
- Using In-Process Testing Metrics to Estimate Software Reliability: A Feasibility Study (2004) (9)
- Cost-aware Vulnerability Prediction: the HARMLESS Approach (2018) (9)
- "Good enough" software reliability estimation plug-in for Eclipse (2003) (9)
- Tool Support for Estimating Software Reliability in Haskell Programs (2004) (9)
- Empirical Evaluation of Agile Processes (2002) (9)
- Modifying Without a Trace : General Audit Guidelines are Inadequate for Electronic Health Record Audit Mechanisms (2011) (8)
- Defect Density Estimation Through Verification and Validation (2006) (8)
- Paired Programming Project: Focus Groups with Teaching Assistants and Students (2002) (8)
- An early testing and defense web application framework for malicious input attacks (2006) (8)
- Improved Recognition of Security Bugs via Dual Hyperparameter Optimization (2019) (8)
- An introduction to performance testing (2006) (8)
- Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers (2017) (8)
- Agile Software Development (2002) (8)
- But, isn't that cheating? [collaborative programming] (1999) (8)
- Automated Adaptive Ranking and Filtering of Static Analysis Alerts (2006) (8)
- Mapping the Field of Software Security Metrics (2014) (7)
- Metric-Based Quality Evaluations for Iterative Software Development Approaches Like Agile (2012) (7)
- DevCOP: A Software Certificate Management System for Eclipse (2006) (7)
- Towards a framework to measure security expertise in requirements analysis (2014) (7)
- A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts (2020) (7)
- Using software reliability models for security assessment — Verification of assumptions (2013) (7)
- An empirical process for building and validating software engineering parametric models (2005) (7)
- How should software reliability engineering (SRE) be taught? (2006) (7)
- Continuously Integrating Security (2018) (7)
- A Metric Suite for Evaluating the Effectiveness of an Agile Methodology (2002) (7)
- Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations (2022) (7)
- Understanding Software Security from Design to Deployment (2020) (7)
- Investigating complexity metrics as indicators of software vulnerability (2011) (7)
- Improving Performance Requirements Specifications from Field Failure Reports (2007) (7)
- Using groupings of static analysis alerts to identify files likely to contain field failures (2007) (6)
- Poster: Identifying Security Issues in Software Development: Are Keywords Enough? (2018) (6)
- "If this is what it's really like, maybe I better major in English": integrating realism into a sophomore software engineering course (1999) (6)
- Different Kind of Smells: Security Smells in Infrastructure as Code Scripts (2021) (6)
- Discovering Decision-Making Patterns for Security Novices and Experts (2015) (6)
- Proposing regulatory-driven automated test suites for electronic health record systems (2013) (6)
- Can fault prediction models and metrics be used for vulnerability prediction (2010) (6)
- Initial results of using in-process testing metrics to estimate software reliability (2004) (6)
- Rational unified process evaluation framework version 1.0 (2005) (6)
- OpenSeminar: Web-based Collaboration Tool for Open Educational Resources (2005) (6)
- A bird's eye view of knowledge needs related to penetration testing (2019) (6)
- Software Engineering for Internet Applications (2004) (6)
- Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard (2021) (5)
- On the Use of Issue Tracking Annotations for Improving Developer Activity Metrics (2010) (5)
- Tailored CMM for a Small e-Commerce Company - Level 2: Repeatable (2001) (5)
- The role of data use agreements in specifying legally compliant software requirements (2011) (5)
- Does Hardware Configuration and Processor Load Impact Software Fault Observability? (2010) (5)
- Strengthening the Evidence that Attack Surfaces Can Be Approximated with Stack Traces (2015) (5)
- Resources for Agile Software Development in the Software Engineering Course (2005) (5)
- Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages (2021) (5)
- Pair Programming and the Factors Affecting Brooks'' Law (2003) (5)
- A Software Reliability Estimation Framework for Extreme Programming (2003) (5)
- Work in progress-unexpected student outcome from collaborative agile software development practices and paired programming in a software engineering course (2004) (5)
- On the feasibility of using operational profiles to determine software reliability in extreme programming (2003) (5)
- On establishing the essential components of a technology-dependent framework (2005) (5)
- Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry (2012) (4)
- The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors] (2021) (4)
- Security risk management by qualitative vulnerability analysis (2011) (4)
- Omni: automated ensemble with unexpected models against adversarial evasion attack (2020) (4)
- Predicting attack-prone components with source code static analyzers (2009) (4)
- On Establishing the Essential Components of a Technology-dependent Framework: A Strawman Framework for Industrial Case Study-Based Research (2005) (4)
- Poster: Defect Prediction Metrics for Infrastructure as Code Scripts in DevOps (2018) (4)
- Collaborative Software (2009) (4)
- Software Engineering Research at the International Conference on Software Engineering in 2016 (2018) (4)
- Teaching Secure Software Development Through an Online Course (2017) (4)
- Collaboration through agile software development practices: Student interviews and lab observations (2004) (3)
- A measurement framework of alert characteristics for false positive mitigation models (2008) (3)
- Non-operational testing of software for security issues (2013) (3)
- Toward extraction of security requirements from text: poster (2018) (3)
- Value-driven system level test case prioritization (2006) (3)
- Deriving performance requirements and test cases with the performance refinement and evolution model (PREM) (2006) (3)
- Feature Toggle Driven Development: Practices usedby Practitioners (2019) (3)
- Certification of Code During Development to Provide an Estimate of Defect Density (2005) (3)
- A process for identifying changes when source code is not available (2005) (3)
- Determining "Grim Reaper" Policies to Prevent Languishing Bugs (2013) (3)
- Software Development Analytics (2014) (3)
- Access Control Policy Evolution: An Empirical Study (2014) (3)
- Investigating the relationship between developer collaboration and software security (2011) (3)
- Çorba: crowdsourcing to obtain requirements from regulations and breaches (2019) (3)
- Instilling a Defect Prevention Philosophy (1998) (3)
- Debunking the Geek Stereotype with Software Engineering Education (2005) (3)
- Managing software performance engineering activities with the performance refinement and evolution model (prem) (2006) (3)
- On the design of empirical studies to evaluate software patterns: A survey (2012) (3)
- Infiltrating security into development: exploring the world’s largest software security study (2021) (3)
- Information needs of developers for program comprehension during software maintenance tasks (2009) (3)
- Correlating Automated Static Analysis Alert Density to Reported Vulnerabilities in Sendmail (2007) (3)
- Measuring Security Practice Use: A Case Study at IBM (2017) (3)
- Classifying Natural Language Sentences for Policy (2012) (3)
- Using groupings of static analysis alerts to identify files likely to contain field failures (2007) (3)
- Why secret detection tools are not enough: It’s not just about false positives - An industrial case study (2022) (3)
- Personality profiles and learning styles of advanced undergraduate computer science students (2005) (3)
- Proposing Regulatory-Driven Automated Test Suites (2013) (3)
- How Should Software Reliability Engineering Be Taught? (2005) (2)
- Pair Programming: Experience the Difference (2002) (2)
- Discovering Security Requirements from Natural Language Project Artifacts (2013) (2)
- Instilling a defect prevention philosophy [software engineering education] (1998) (2)
- On the need for a process for making reliable quality comparisons with industrial data (2004) (2)
- Toward an XP Evaluation Framework (2003) (2)
- Highlights of the ACM student research competition (2017) (2)
- A synopsis of static analysis alerts on open source software (2019) (2)
- An Empirical Study of the Factors Relating Field Failures and Dependencies (2011) (2)
- On Identifying Deficiencies in a Knowledge Management System (2003) (2)
- On Coverage-Based Attack Profiles (2014) (2)
- Exploring the use of a .safe subset. of extreme programming: An industrial case study (2004) (2)
- Virtual Collaboration through Distributed Pair Programming (2003) (2)
- From a Provider's Perspective: Integrating Evidence-Based Practice into the Culture of a Social Service Organization (2015) (2)
- How bad is it, really? an analysis of severity scores for vulnerabilities: poster (2018) (2)
- Can traditional fault prediction models be used for vulnerability prediction? (2011) (2)
- Bugs in Infrastructure as Code (2018) (1)
- Teaching an Active-Participation University Course in Software Reliability and Testing (2005) (1)
- Conjectures of informal communication-centric practices observed in a distributed software development team (2005) (1)
- Strengthening the Empirical Analysis of the Relationship (2010) (1)
- Examining Time as a Factor in Young Women's Information Technology Career Decisions (2007) (1)
- Evaluating a suite of developer activity metrics as measures of security vulnerabilities (2008) (1)
- On the Use of Software Metrics as a Predictor of Software Security Problems (2013) (1)
- Memory Error Detection in Security Testing (2021) (1)
- John D. Musa (2009) (1)
- Security Smells in Infrastructure as Code Scripts (2019) (1)
- Extracting Database Role Based Access Control from Unconstrained Natural Language Text (2012) (1)
- Performance requirements improvement with an evolutionary model (2008) (1)
- Launching automated security attacks through unit-level penetration testing (2006) (1)
- Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014 (2014) (1)
- Secure Software Lifecycle (1)
- Categorizing Defects in Infrastructure as Code (2018) (1)
- Continuous Deployment Transitions at Scale (2020) (1)
- Predicting attack-prone components with internal metrics (2008) (1)
- Phantom Artifacts & Code Review Coverage in Dependency Updates (2022) (1)
- Agile Software Development Methods: When and Why Do They Work? (2005) (1)
- An Economic Analysis of Pair Programming (2002) (1)
- BP: Profiling Vulnerabilities on the Attack Surface (2018) (1)
- A study of static analysis for fault detection in software (2005) (1)
- IEEE Seventh International Conference on Software Testing, Verification and Validation. 31 March4 April 2014 Cleveland, Ohio, USA (2014) (1)
- Software Engineering in Health Care (2014) (1)
- Proceedings of the 38th International Conference on Software Engineering Companion (2016) (0)
- Seven habits of highly impactful empirical software engineers (2011) (0)
- Improving Developer Activity Metrics with Issue Tracking (2010) (0)
- Software Security Readiness and Deployment (2021) (0)
- Toward a normative approach for forensicability (2016) (0)
- Exploring the Shift in Security Responsibility (2022) (0)
- Risk-based attack surface approximation: poster (2016) (0)
- Building forensics in: supporting the investigation of digital criminal activities (invited talk) (2017) (0)
- In regression testing without code (2007) (0)
- Session details: Education papers: advanced topics in software engineering education (2006) (0)
- Proceedings 21st Conference on Software Engineering Education and Training, CSEET 2008, 14-17 April 2008, Charleston, South Carolina, USA (2008) (0)
- NEED AIR ING IN TEN (2006) (0)
- An Extended Model of Software Configuration (2022) (0)
- Attack Surface Prioritization with Crash Dump Stack Traces (2017) (0)
- Industry-Research Collaboration Working Group Results (2006) (0)
- A study of the acceptance of XP practice (2002) (0)
- Guest editorial: Special issue on software reliability engineering (2010) (0)
- Step One Towards Science of Security (2017) (0)
- Using Data to Make Decisions in Software Engineering (2015) (0)
- On the effectiveness of static analysis tools for fault-detection (2005) (0)
- Workshop 3: Integrating Agile Practices into Software Engineering Courses (2002) (0)
- Understanding Software Security from Design to Deployment (2021) (0)
- To branch or not to branch that is the question (2013) (0)
- International Workshop on Empirical Evaluation of Agile Methods ("The Data Workshop") (2003) (0)
- The Advancement of Science in Cyber Security (2017) (0)
- Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription (2023) (0)
- AIR ING IN (2000) (0)
- Discovering Security Requirements from Natural Language (2014) (0)
- Stack traces reveal attack surfaces (2016) (0)
- 2 . 1 . 1 Creating Choke Points to Prevent XSS (2006) (0)
- Which faults are security faults (2009) (0)
- On the Development of A Black Box Security Test Pattern Catalog Based on Empirical Data (2011) (0)
- An Analysis of HIPAA Breach Data (2012) (0)
- Mining Metrics for Predicting Intermittent Software Failures (2011) (0)
- ITWF : Collaboration Through Agile Software Development Practices : A Means for Improvement in Quality & Retention of IT Worker (2009) (0)
- Conversations (oral history interviews) with members of North Carolina State University Computer Science Department by Carol Lee and Carolyn Miller (2017) (0)
- Proceedings of the 6th International Workshop on Security Measurements and Metrics (2010) (0)
- Building Regulatory-Driven Automated Test Suites (2012) (0)
- Science Leaves Clues (2019) (0)
- Session details: Test-driven development (2006) (0)
- To log, or not to log: using heuristics to identify mandatory log events – a controlled experiment (2016) (0)
- The rising tide lifts all boats: the advancement of science in cyber security (invited talk) (2017) (0)
- Attack surface definitions: Attack surface definitions: A systematic literature review (2018) (0)
- Dazzle (2022) (0)
- An analysis of Fedora security profile (2014) (0)
- What are the Practices for Secret Management in Software Artifacts? (2022) (0)
- Welcome to ICSE in the Great State of Texas (2016) (0)
- Privacy and security: what are you doing to keep the community safe? (2008) (0)
- Software development with feature toggles: practices used by practitioners (2021) (0)
- Do configuration management tools make systems more secure?: an empirical research plan (2020) (0)
- Roadmapping Working Group 4 Results (2006) (0)
- A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER (2018) (0)
- Structuring Families of Industrial Case Studies (2006) (0)
This paper list is powered by the following services:
Other Resources About Laurie Williams
What Schools Are Affiliated With Laurie Williams ?
Laurie Williams is affiliated with the following schools: