Jason King

2018 article

Developing Software Engineering Skills using Real Tools for Automated Grading

SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 794–799.

By: S. Heckman & J. King

Source: Web Of Science
Added: September 16, 2019

2017 journal article

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

Empirical Software Engineering, 22(4), 2127–2178.

By: M. Riaz, J. King, J. Slankas, L. Williams, F. Massacci, C. Quesada-Lopez, M. Jenkins

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

To log, or not to log: Using heuristics to identify mandatory log events - a controlled experiment

Empirical Software Engineering, 22(5), 2684–2717.

By: J. King, J. Stallings, M. Riaz & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

2014 ieee 22nd international requirements engineering conference (re), 183–192.

By: M. Riaz, J. King, J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Measuring the forensic-ability of audit logs for nonrepudiation

Proceedings of the 35th International Conference on software engineering (ICSE 2013), 1419–1422.

By: J. King

Source: NC State University Libraries
Added: August 6, 2018