2018 article

Does ACM's Code of Ethics Change Ethical Decision Making in Software Development?

ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 729–733.

By: A. McNamara n, J. Smith n & E. Murphy-Hill n

author keywords: ACM code of ethics; software engineering
TL;DR: This work replicated a prior behavioral ethics study with 63 software engineering students and 105 professional software developers, and found that explicitly instructing participants to consider the ACM code of ethics in their decision making had no observed effect when compared with a control group. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: March 25, 2019

2017 article

Cheetah: Just-in-Time Taint Analysis for Android Apps

PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), pp. 39–42.

TL;DR: Cheetah is a static taint analysis tool for Android apps that interleaves bug fixing and code development in the Eclipse integrated development environment that discovers and reports the most relevant results to the developer fast, and computes the more complex results incrementally later. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Identifying successful strategies for resolving static analysis notifications

2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C), 662–664.

By: J. Smith

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Resolving input validation vulnerabilities by retracing taint flow through source code

2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 252–253.

By: J. Smith

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

A study of interactive code annotation for access control vulnerabilities

Proceedings 2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), 73–77.

By: T. Thomas*, B. Chu*, H. Lipford*, J. Smith n & E. Murphy-Hill n

TL;DR: This paper evaluated whether developers could indicate access control logic using interactive annotation and understand the vulnerabilities reported as a result and provided design guidance for improving the interaction and communication of such security tools with developers. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

FUSE: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets

12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), pp. 486–489.

By: T. Barik n, K. Lubick n, J. Smith n, J. Slankas n & E. Murphy-Hill n

TL;DR: A corpus, called Fuse, containing 2,127,284 URLs that return spreadsheets (and their HTTP server responses), and 249,376 unique spreadsheets, contained within a public web archive of over 26.83 billion pages is described. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2015 article

Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 248–259.

By: J. Smith n, B. Johnson n, E. Murphy-Hill n, B. Chu* & H. Lipford*

author keywords: Developer questions; human factors; security; static analysis
TL;DR: An exploratory study with novice and experienced software developers equipped with Find Security Bugs and observed their interactions with security vulnerabilities in an open-source system that they had previously contributed to found that they asked questions not only about security vulnerabilities, associated attacks, and fixes, but also questions about the software itself, the social ecosystem that built the software, and related resources and tools. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2014 conference paper

A model based fault locating method for distribution systems

2014 ieee pes general meeting - conference & exposition.

By: M. Baran n, A. Padmanabhan n, S. Chouhan, X. Yuan n, J. Smith n & H. Mayfield

Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.