2018 article

Does ACM's Code of Ethics Change Ethical Decision Making in Software Development?

ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 729–733.

By: A. McNamara n, J. Smith n & E. Murphy-Hill n

author keywords: ACM code of ethics; software engineering
Source: Web Of Science
Added: March 25, 2019

2017 article

Cheetah: Just-in-Time Taint Analysis for Android Apps

PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), pp. 39–42.

By: L. Do, K. Ali*, B. Livshits *, E. Bodden *, J. Smith n & E. Murphy-Hill n

co-author countries: Canada πŸ‡¨πŸ‡¦ Germany πŸ‡©πŸ‡ͺ United Kingdom of Great Britain and Northern Ireland πŸ‡¬πŸ‡§
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Identifying successful strategies for resolving static analysis notifications

2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C), 662–664.

By: J. Smith

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Resolving input validation vulnerabilities by retracing taint flow through source code

2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 252–253.

By: J. Smith

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

A study of interactive code annotation for access control vulnerabilities

Proceedings 2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), 73–77.

By: T. Thomas*, B. Chu*, H. Lipford *, J. Smith n & E. Murphy-Hill n

Source: NC State University Libraries
Added: August 6, 2018

2015 article

FUSE: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets

12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), pp. 486–489.

By: T. Barik n, K. Lubick n, J. Smith n, J. Slankas n & E. Murphy-Hill n

Source: Web Of Science
Added: August 6, 2018

2015 article

Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 248–259.

By: J. Smith n, B. Johnson n, E. Murphy-Hill n, B. Chu* & H. Lipford *

author keywords: Developer questions; human factors; security; static analysis
Source: Web Of Science
Added: August 6, 2018

2014 conference paper

A model based fault locating method for distribution systems

2014 ieee pes general meeting - conference & exposition.

By: M. Baran n , A. Padmanabhan n, S. Chouhan, X. Yuan n, J. Smith n & H. Mayfield

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of ScienceΒ© and InCitesΒ© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.