Year |
Citation |
Score |
2022 |
Rahman MR, Imtiaz N, Storey MA, Williams L. Why secret detection tools are not enough: It's not just about false positives - An industrial case study. Empirical Software Engineering. 27: 59. PMID 35313538 DOI: 10.1007/s10664-021-10109-y |
0.303 |
|
2020 |
Mirakhorli M, Galster M, Williams L. Understanding Software Security from Design to Deployment Acm Sigsoft Software Engineering Notes. 45: 25-26. DOI: 10.1145/3385678.3385687 |
0.351 |
|
2020 |
Theisen C, Williams L. Better Together: Comparing Vulnerability Prediction Models Information & Software Technology. 119: 106204. DOI: 10.1016/J.Infsof.2019.106204 |
0.346 |
|
2020 |
Rahman A, Farhana E, Williams L. The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code Empirical Software Engineering. 25: 3430-3467. DOI: 10.1007/S10664-020-09841-8 |
0.347 |
|
2020 |
Guo H, Kafalı Ö, Jeukeng A, Williams L, Singh MP. Çorba : crowdsourcing to obtain requirements from regulations and breaches Empirical Software Engineering. 25: 532-561. DOI: 10.1007/S10664-019-09753-2 |
0.403 |
|
2019 |
Yu Z, Theisen C, Williams L, Menzies T. Improving Vulnerability Inspection Efficiency Using Active Learning Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2019.2949275 |
0.379 |
|
2019 |
Rahman A, Williams L. Source code properties of defective infrastructure as code scripts Information & Software Technology. 112: 148-163. DOI: 10.1016/J.Infsof.2019.04.013 |
0.326 |
|
2019 |
Rahman A, Mahdavi-Hezaveh R, Williams L. A systematic mapping study of infrastructure as code research Information & Software Technology. 108: 65-77. DOI: 10.1016/J.Infsof.2018.12.004 |
0.378 |
|
2018 |
Theisen C, Dunaiski M, Williams L, Visser W. Software Engineering Research at the International Conference on Software Engineering in 2016 Acm Sigsoft Software Engineering Notes. 42: 1-7. DOI: 10.1145/3149485.3149496 |
0.401 |
|
2018 |
Williams L, McGraw G, Migues S. Engineering Security Vulnerability Prevention, Detection, and Response Ieee Software. 35: 76-80. DOI: 10.1109/Ms.2018.290110854 |
0.414 |
|
2018 |
Theisen C, Munaiah N, Al-Zyoud M, Carver JC, Meneely A, Williams L. Attack surface definitions: A systematic literature review Information & Software Technology. 104: 94-103. DOI: 10.1016/J.Infsof.2018.07.008 |
0.302 |
|
2018 |
Morrison P, Moye D, Pandita R, Williams L. Mapping the field of software life cycle security metrics Information & Software Technology. 102: 146-159. DOI: 10.1016/J.Infsof.2018.05.011 |
0.408 |
|
2018 |
Morrison PJ, Pandita R, Xiao X, Chillarege R, Williams L. Are vulnerabilities discovered and resolved like other defects Empirical Software Engineering. 23: 1383-1421. DOI: 10.1007/S10664-017-9541-1 |
0.365 |
|
2017 |
Parnin C, Helms E, Atlee C, Boughton H, Ghattas M, Glover A, Holman J, Micco J, Murphy B, Savor T, Stumm M, Whitaker S, Williams L. The Top 10 Adages in Continuous Deployment Ieee Software. 34: 86-95. DOI: 10.1109/Ms.2017.86 |
0.368 |
|
2017 |
Riaz M, King JT, Slankas J, Williams L, Massacci F, Quesada-López C, Jenkins M. Identifying the implied: Findings from three differentiated replications on the use of security requirements templates Empirical Software Engineering. 22: 2127-2178. DOI: 10.1007/S10664-016-9481-1 |
0.332 |
|
2017 |
King JT, Stallings J, Riaz M, Williams L. To log, or not to log: using heuristics to identify mandatory log events – a controlled experiment Empirical Software Engineering. 22: 2684-2717. DOI: 10.1007/S10664-016-9449-1 |
0.31 |
|
2017 |
Pandita R, Jetley R, Sudarsan S, Menzies T, Williams L. TMAP: Discovering relevant API methods through text mining of API documentation Journal of Software: Evolution and Process. 29. DOI: 10.1002/Smr.1845 |
0.301 |
|
2016 |
Hibshi H, Breaux TD, Riaz M, Williams L. A grounded analysis of experts’ decision-making during security assessments Journal of Cybersecurity. 2: 147-163. DOI: 10.1093/Cybsec/Tyw010 |
0.313 |
|
2015 |
Riaz M, Breaux T, Williams L. How have we evaluated software pattern application? A systematic mapping study of research design practices Information and Software Technology. 65: 14-38. DOI: 10.1016/J.Infsof.2015.04.002 |
0.368 |
|
2014 |
Srikanth H, Banerjee S, Williams L, Osborne J. Towards the prioritization of system test cases Software Testing, Verification & Reliability. 24: 320-337. DOI: 10.1002/Stvr.1500 |
0.366 |
|
2013 |
Austin A, Holmgreen C, Williams L. A comparison of the efficiency and effectiveness of vulnerability discovery techniques Information & Software Technology. 55: 1279-1288. DOI: 10.1016/J.Infsof.2012.11.007 |
0.378 |
|
2012 |
Meneely A, Smith B, Williams L. Validating software metrics: A spectrum of philosophies Acm Transactions On Software Engineering and Methodology. 21: 24. DOI: 10.1145/2377656.2377661 |
0.364 |
|
2012 |
Williams L. What agile teams think of agile principles Communications of the Acm. 55: 71-76. DOI: 10.1145/2133806.2133823 |
0.368 |
|
2011 |
Shin Y, Meneely A, Williams L, Osborne JA. Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities Ieee Transactions On Software Engineering. 37: 772-787. DOI: 10.1109/Tse.2010.81 |
0.402 |
|
2011 |
Heckman S, Williams L. A systematic literature review of actionable alert identification techniques for automated static code analysis Information & Software Technology. 53: 363-387. DOI: 10.1016/J.Infsof.2010.12.007 |
0.338 |
|
2010 |
Meneely A, Williams L. On the Use of Issue Tracking Annotations for Improving Developer Activity Metrics Advances in Software Engineering. 2010: 1-9. DOI: 10.1155/2010/273080 |
0.353 |
|
2010 |
Williams L. Agile Software Development Methodologies and Practices Advances in Computers. 80: 1-44. DOI: 10.1016/S0065-2458(10)80001-4 |
0.429 |
|
2010 |
Williams L. Guest editorial: Special issue on software reliability engineering Empirical Software Engineering. 15: 321-322. DOI: 10.1007/S10664-010-9129-5 |
0.367 |
|
2009 |
Everett W, Cusick J, Williams L. John D. Musa Ieee Software. 26: 102-102. DOI: 10.1109/Ms.2009.132 |
0.326 |
|
2009 |
Smith BH, Williams L. Should software testers use mutation analysis to augment a test set Journal of Systems and Software. 82: 1819-1832. DOI: 10.1016/J.Jss.2009.06.031 |
0.312 |
|
2008 |
Nagappan N, Maximilien EM, Bhat T, Williams L. Realizing quality improvement through test driven development: Results and experiences of four industrial teams Empirical Software Engineering. 13: 289-302. DOI: 10.1007/S10664-008-9062-Z |
0.427 |
|
2007 |
Johnson MJ, Maximilien EM, Ho CW, Williams L. Incorporating performance testing in test-driven development Ieee Software. 24: 67-73. DOI: 10.1109/Ms.2007.77 |
0.321 |
|
2007 |
Gegick M, Williams L. On the design of more secure software-intensive systems by use of attack patterns Information & Software Technology. 49: 381-397. DOI: 10.1016/J.Infsof.2006.06.002 |
0.415 |
|
2006 |
Garzia M, Hudepohl J, Snipes W, Lyu M, Musa J, Smidts C, Williams L. How should software reliability engineering (SRE) be taught? Acm Sigsoft Software Engineering Notes. 31: 1-5. DOI: 10.1145/1142958.1142961 |
0.405 |
|
2006 |
Zheng J, Williams L, Nagappan N, Snipes W, Hudepohl JP, Vouk MA. On the value of static analysis for fault detection in software Ieee Transactions On Software Engineering. 32: 240-253. DOI: 10.1109/Tse.2006.38 |
0.331 |
|
2006 |
Williams L. Debunking the nerd stereotype with pair programming Ieee Computer. 39: 83-85. DOI: 10.1109/Mc.2006.160 |
0.344 |
|
2006 |
Layman L, Williams L, Cunningham L. Motivations and measurements in an agile case study Journal of Systems Architecture. 52: 654-667. DOI: 10.1016/J.Sysarc.2006.06.009 |
0.365 |
|
2006 |
Layman L, Williams L, Damian D, Bures H. Essential communication practices for Extreme Programming in a global software development team Information and Software Technology. 48: 781-794. DOI: 10.1016/J.Infsof.2006.01.004 |
0.335 |
|
2005 |
Nagappan N, Williams L, Vouk M, Osborne J. Early estimation of software quality using in-process testing metrics: A controlled case study Proceedings - International Conference On Software Engineering. 46-52. DOI: 10.1145/1082983.1083304 |
0.381 |
|
2005 |
Gegick M, Williams L. Matching attack patterns to security vulnerabilities in software-intensive system designs Acm Sigsoft Software Engineering Notes. 30: 1-7. DOI: 10.1145/1082983.1083211 |
0.372 |
|
2005 |
Williams L, Layman L, Abrahamsson P. On establishing the essential components of a technology-dependent framework: a strawman framework for industrial case study-based research Acm Sigsoft Software Engineering Notes. 30: 1-5. DOI: 10.1145/1082983.1083179 |
0.366 |
|
2005 |
Srikanth H, Williams L. On the economics of requirements-based test case prioritization Acm Sigsoft Software Engineering Notes. 30: 1-3. DOI: 10.1145/1082983.1083100 |
0.35 |
|
2005 |
Zheng J, Robinson B, Williams L, Smiley K. A process for identifying changes when source code is not available Acm Sigsoft Software Engineering Notes. 30: 1-4. DOI: 10.1145/1082983.1082957 |
0.336 |
|
2004 |
Williams L. On the need for a process for making reliable quality comparisons with industrial data Acm Sigsoft Software Engineering Notes. 29: 1-4. DOI: 10.1145/1022494.1022546 |
0.35 |
|
2004 |
Ho C, Slaten K, Williams L, Berenson S. Work in progress-unexpected student outcome from collaborative agile software development practices and paired programming in a software engineering course Frontiers in Education. 621-622. DOI: 10.1109/Fie.2004.1408595 |
0.394 |
|
2004 |
George B, Williams LA. A structured experiment of test-driven development Information & Software Technology. 46: 337-342. DOI: 10.1016/J.Infsof.2003.09.011 |
0.398 |
|
2003 |
Williams L, Cockburn A. Agile software development: it's about feedback and change Ieee Computer. 36: 39-43. DOI: 10.1109/Mc.2003.1204373 |
0.378 |
|
2003 |
Erdogmus H, Williams L. The Economics Of Software Development By Pair Programmers The Engineering Economist. 48: 283-319. DOI: 10.1080/00137910309408770 |
0.422 |
|
2003 |
Melnik G, Williams LA, Geras A. 2nd International Workshop on Empirical Evaluation of Agile Methods (“The Data Workshop”) Lecture Notes in Computer Science. 211-211. DOI: 10.1007/978-3-540-45122-8_26 |
0.363 |
|
2003 |
Nagappan N, Williams LA, Wiebe EN, Miller C, Balik S, Ferzli M, Petlick J. Pair Learning: With an Eye Toward Future Success Lecture Notes in Computer Science. 185-198. DOI: 10.1007/978-3-540-45122-8_21 |
0.313 |
|
2003 |
Stotts PD, Williams LA, Nagappan N, Baheti P, Jen D, Jackson A. Virtual teaming: Experiments and experiences with distributed pair programming Lecture Notes in Computer Science. 2753: 129-141. DOI: 10.1007/978-3-540-45122-8_15 |
0.378 |
|
2002 |
Börstler J, Carrington D, Hislop GW, Lisack S, Olson K, Williams L. Teaching PSP: Challenges and lessons learned Ieee Software. 19: 42-48. DOI: 10.1109/Ms.2002.1032853 |
0.389 |
|
2002 |
Williams L, Wiebe E, Yang K, Ferzli M, Miller C. In Support of Pair Programming in the Introductory Computer Science Course Computer Science Education. 12: 197-212. DOI: 10.1076/Csed.12.3.197.8618 |
0.301 |
|
2002 |
Hislop GW, Lutz MJ, Naveda JF, McCracken WM, Mead NR, Williams LA. Integrating Agile Practices into Software Engineering Courses Computer Science Education. 12: 169-185. DOI: 10.1076/Csed.12.3.169.8619 |
0.421 |
|
2002 |
Williams L, Tomayko JE. Agile Software Development Computer Science Education. 12: 167-168. DOI: 10.1076/Csed.12.3.167.8613 |
0.393 |
|
2002 |
Lindvall M, Basili VR, Boehm BW, Costa P, Dangle K, Shull F, Tesoriero R, Williams LA, Zelkowitz MV. Empirical Findings in Agile Methods Lecture Notes in Computer Science. 197-207. DOI: 10.1007/3-540-45672-4_19 |
0.337 |
|
2001 |
Carter RA, Anton AI, Dagnino A, Williams L. Evolving beyond requirements creep: a risk-based evolutionary prototyping model Requirements Engineering. 94-101. DOI: 10.1109/Isre.2001.948548 |
0.389 |
|
2001 |
Williams LA, Kessler RR. Experiments with Industry's ''Pair-Programming'' Model in the Computer Science Classroom Computer Science Education. 11: 7-20. DOI: 10.1076/Csed.11.1.7.3846 |
0.328 |
|
2000 |
Williams L, Kessler RR, Cunningham W, Jeffries R. Strengthening the case for pair programming Ieee Software. 17: 19-25. DOI: 10.1109/52.854064 |
0.341 |
|
1999 |
Williams LA. Adjusting the instruction of the personal software process to improve student participation Computer Standards & Interfaces. 21: 162. DOI: 10.1016/S0920-5489(99)92164-5 |
0.313 |
|
Show low-probability matches. |