关注
Patrick Morrison
Patrick Morrison
在 duke.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Challenges with applying vulnerability prediction models
P Morrison, K Herzig, B Murphy, L Williams
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-9, 2015
1722015
Is programming knowledge related to age? an exploration of stack overflow
P Morrison, E Murphy-Hill
2013 10th Working Conference on Mining Software Repositories (MSR), 69-72, 2013
882013
Mapping the field of software life cycle security metrics
P Morrison, D Moye, R Pandita, L Williams
Information and Software Technology 102, 146-159, 2018
822018
Approximating attack surfaces with stack traces
C Theisen, K Herzig, P Morrison, B Murphy, L Williams
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
722015
What questions do programmers ask about configuration as code?
A Rahman, A Partho, P Morrison, L Williams
Proceedings of the 4th International Workshop on Rapid Continuous Software …, 2018
472018
Are vulnerabilities discovered and resolved like other defects?
PJ Morrison, R Pandita, X Xiao, R Chillarege, L Williams
Proceedings of the 40th International Conference on Software Engineering …, 2018
472018
Stat! an interactive analytics environment for big data
M Barnett, B Chandramouli, R DeLine, S Drucker, D Fisher, J Goldstein, ...
Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013
452013
The credentials pattern
P Morrison, EB Fernandez
Proceedings of the 2006 conference on Pattern languages of programs, 1-4, 2006
322006
Surveying security practice adherence in software development
P Morrison, BH Smith, L Williams
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
252017
Securing the Broker Pattern.
P Morrison, EB Fernandez
EuroPLoP, 513-530, 2006
222006
A security practices evaluation framework
P Morrison
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
172015
Veteran developers' contributions and motivations: An open source perspective
P Morrison, R Pandita, E Murphy-Hill, A McLaughlin
2016 IEEE symposium on visual languages and human-centric computing (VL/HCC …, 2016
142016
Is programming knowledge related to age
P Morrison, E Murphy-Hill
Companion to the Working Conference on Mining Software Repositories, 1-4, 2013
142013
Shhh!: 12 practices for secret management in infrastructure as code
A Rahman, FL Barsha, P Morrison
2021 IEEE secure development conference (SecDev), 56-62, 2021
102021
Measuring security practice use: A case study at IBM
P Morrison, BH Smith, L Williams
2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in …, 2017
92017
Identifying security issues in software development: are keywords enough?
P Morrison, TD Oyetoyan, L Williams
Proceedings of the 40th International Conference on Software Engineering …, 2018
82018
A security practices evaluation framework
PJ Morrison
North Carolina State University, 2017
82017
Approximating attack surfaces with stack traces. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol. 2
C Theisen, K Herzig, P Morrison, B Murphy, L Williams
IEEE, 2015
82015
An improved text classification modelling approach to identify security messages in heterogeneous projects
TD Oyetoyan, P Morrison
Software Quality Journal 29, 509-553, 2021
72021
Proposing regulatory-driven automated test suites for electronic health record systems
P Morrison, C Holmgreen, A Massey, L Williams
2013 5th International Workshop on Software Engineering in Health Care (SEHC …, 2013
72013
系统目前无法执行此操作,请稍后再试。
文章 1–20