Challenges with applying vulnerability prediction models P Morrison, K Herzig, B Murphy, L Williams Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-9, 2015 | 172 | 2015 |
Is programming knowledge related to age? an exploration of stack overflow P Morrison, E Murphy-Hill 2013 10th Working Conference on Mining Software Repositories (MSR), 69-72, 2013 | 88 | 2013 |
Mapping the field of software life cycle security metrics P Morrison, D Moye, R Pandita, L Williams Information and Software Technology 102, 146-159, 2018 | 82 | 2018 |
Approximating attack surfaces with stack traces C Theisen, K Herzig, P Morrison, B Murphy, L Williams 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 72 | 2015 |
What questions do programmers ask about configuration as code? A Rahman, A Partho, P Morrison, L Williams Proceedings of the 4th International Workshop on Rapid Continuous Software …, 2018 | 47 | 2018 |
Are vulnerabilities discovered and resolved like other defects? PJ Morrison, R Pandita, X Xiao, R Chillarege, L Williams Proceedings of the 40th International Conference on Software Engineering …, 2018 | 47 | 2018 |
Stat! an interactive analytics environment for big data M Barnett, B Chandramouli, R DeLine, S Drucker, D Fisher, J Goldstein, ... Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013 | 45 | 2013 |
The credentials pattern P Morrison, EB Fernandez Proceedings of the 2006 conference on Pattern languages of programs, 1-4, 2006 | 32 | 2006 |
Surveying security practice adherence in software development P Morrison, BH Smith, L Williams Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017 | 25 | 2017 |
Securing the Broker Pattern. P Morrison, EB Fernandez EuroPLoP, 513-530, 2006 | 22 | 2006 |
A security practices evaluation framework P Morrison 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015 | 17 | 2015 |
Veteran developers' contributions and motivations: An open source perspective P Morrison, R Pandita, E Murphy-Hill, A McLaughlin 2016 IEEE symposium on visual languages and human-centric computing (VL/HCC …, 2016 | 14 | 2016 |
Is programming knowledge related to age P Morrison, E Murphy-Hill Companion to the Working Conference on Mining Software Repositories, 1-4, 2013 | 14 | 2013 |
Shhh!: 12 practices for secret management in infrastructure as code A Rahman, FL Barsha, P Morrison 2021 IEEE secure development conference (SecDev), 56-62, 2021 | 10 | 2021 |
Measuring security practice use: A case study at IBM P Morrison, BH Smith, L Williams 2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in …, 2017 | 9 | 2017 |
Identifying security issues in software development: are keywords enough? P Morrison, TD Oyetoyan, L Williams Proceedings of the 40th International Conference on Software Engineering …, 2018 | 8 | 2018 |
A security practices evaluation framework PJ Morrison North Carolina State University, 2017 | 8 | 2017 |
Approximating attack surfaces with stack traces. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol. 2 C Theisen, K Herzig, P Morrison, B Murphy, L Williams IEEE, 2015 | 8 | 2015 |
An improved text classification modelling approach to identify security messages in heterogeneous projects TD Oyetoyan, P Morrison Software Quality Journal 29, 509-553, 2021 | 7 | 2021 |
Proposing regulatory-driven automated test suites for electronic health record systems P Morrison, C Holmgreen, A Massey, L Williams 2013 5th International Workshop on Software Engineering in Health Care (SEHC …, 2013 | 7 | 2013 |