关注
Ben Smith
Ben Smith
Security and Compliance Focal, IBM
在 us.ibm.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Validating software metrics: A spectrum of philosophies
A Meneely, B Smith, L Williams
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (4), 1-28, 2013
1362013
On guiding the augmentation of an automated test suite via mutation analysis
BH Smith, L Williams
Empirical software engineering 14, 341-369, 2009
932009
An empirical evaluation of the MuJava mutation operators
BH Smith, L Williams
Testing: Academic and Industrial Conference Practice and Research Techniques …, 2007
862007
Appendix B: iTrust electronic health care system case study
A Meneely, B Smith, L Williams
Software and Systems Traceability 425, 2012
772012
Truckers drive their own assessment for obstructive sleep apnea: a collaborative approach to online self-assessment for obstructive sleep apnea
B Smith, BA Phillips
Journal of clinical sleep medicine 7 (3), 241-245, 2011
642011
Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms
JT King, B Smith, L Williams
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
502012
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected
B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams
Proceedings of the second annual workshop on Security and privacy in medical …, 2010
492010
Should software testers use mutation analysis to augment a test set?
BH Smith, L Williams
Journal of Systems and Software 82 (11), 1819-1832, 2009
482009
Using SQL hotspots in a prioritization heuristic for detecting all types of web application vulnerabilities
B Smith, L Williams
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
382011
Assessing the accuracy of legal implementation readiness decisions
AK Massey, B Smith, PN Otto, AI Antón
2011 IEEE 19th International Requirements Engineering Conference, 207-216, 2011
342011
On the effective use of security test patterns
B Smith, L Williams
2012 IEEE Sixth International Conference on Software Security and …, 2012
312012
Surveying security practice adherence in software development
P Morrison, BH Smith, L Williams
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
252017
Towards improved security criteria for certification of electronic health record systems
A Austin, B Smith, L Williams
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care …, 2010
242010
IBM Blockchain: An enterprise deployment of a distributed consensus-based transaction log
B Smith, K Christidis
Proc. Fourth International IBM Cloud Academy Conference 210, 2016
222016
A survey on code coverage as a stopping criterion for unit testing
B Smith, LA Williams
North Carolina State University. Dept. of Computer Science, 2008
222008
Idea: using system level testing for revealing SQL injection-related error message information leaks
B Smith, L Williams, A Austin
Engineering Secure Software and Systems: Second International Symposium …, 2010
192010
Software metrics validation criteria: A systematic literature review
A Meneely, B Smith, LA Williams
North Carolina State University. Dept. of Computer Science, 2010
182010
Proposing SQL statement coverage metrics
B Smith, Y Shin, L Williams
Proceedings of the fourth international workshop on Software engineering for …, 2008
162008
Systematizing security test case planning using functional requirements phrases
B Smith
Proceedings of the 33rd International Conference on Software Engineering …, 2011
112011
Climate Emergency, Urban Opportunity: The unique and crucial roles of national governments
S Colenbrander, L Lazar, C Haddaoui, N Godfrey, A Lobo, H Clarkson, ...
World Resources Institute and C40 Cities Climate Leadership Group, 2019
102019
系统目前无法执行此操作,请稍后再试。
文章 1–20