Works (19)

Updated: July 5th, 2023 15:36

2021 conference paper

Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report

Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, 959–965.

By: J. King n

Event: at New York, NY, USA

Source: ORCID
Added: March 18, 2021

2020 article

Integrating Testing Throughout the CS Curriculum

2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), pp. 441–444.

By: S. Heckman n, J. Schmidt n & J. King n

author keywords: testing; CS1; CS2
Sources: Web Of Science, ORCID
Added: March 8, 2021

2018 article

Developing Software Engineering Skills using Real Tools for Automated Grading

SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 794–799.

By: S. Heckman n & J. King n

Event: at New York, NY, USA

author keywords: Automated grading; continuous integration; version control; software engineering best practice
Sources: Web Of Science, ORCID
Added: September 16, 2019

2017 journal article

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178.

By: M. Riaz n, J. King n, J. Slankas n, L. Williams n, F. Massacci*, C. Quesada-Lopez*, M. Jenkins*

author keywords: Security requirements; Controlled experiment; Replication; Requirements engineering; Templates; Patterns; Automation
Sources: Web Of Science, ORCID
Added: August 6, 2018

2017 journal article

To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment

EMPIRICAL SOFTWARE ENGINEERING, 22(5), 2684–2717.

By: J. King n, J. Stallings n, M. Riaz n & L. Williams n

author keywords: Logging; User activity logs; Security; Controlled experiment; User study; Mandatory log events
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 conference paper

Establishing a Baseline for Measuring Advancement in the Science of Security: An Analysis of the 2015 IEEE Security & Privacy Proceedings

Proceedings of the Symposium and Bootcamp on the Science of Security, 38–51.

By: J. Carver*, M. Burcham*, S. Kocak*, A. Bener*, M. Felderer*, M. Gander*, J. King n, J. Markkula* ...

Event: at New York, NY, USA

author keywords: Science of Security; Literature Review
Source: ORCID
Added: March 17, 2021

2016 conference paper

Teaching Software Engineering Skills in CS1.5: Incorporating Real-world Practices and Tools (Abstract Only)

Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 696–697.

By: S. Heckman n & J. King n

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021

2015 conference paper

Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework (Abstract Only)

Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 677–677.

By: S. Heckman n, J. King n & M. Winters n

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021

2015 conference paper

Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events

Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 6:1–6:11.

By: J. King n, R. Pandita n & L. Williams n

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021

2015 report

Security Literature Review Paper Analysis Rubric

Technical Report #SERG-2015-01.

By: A. Bosu, C. Corley, J. Carver, M. Gander, J. King, S. Kocak, J. Markkula

Source: ORCID
Added: March 17, 2021

2014 conference paper

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

2014 ieee 22nd international requirements engineering conference (re), 183–192.

By: M. Riaz n, J. King n, J. Slankas n & L. Williams n

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2014 conference paper

Log Your CRUD: Design Principles for Software Logging Mechanisms

Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 5:1–5:10.

By: J. King n & L. Williams n

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021

2014 conference paper

Using Templates to Elicit Implied Security Requirements from Functional Requirements - a Controlled Experiment

Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 22:1–22:10.

By: M. Riaz n, J. Slankas n, J. King n & L. Williams n

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021

2013 conference paper

Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems

Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, 4–4. http://dl.acm.org/citation.cfm?id=2696523.2696527

By: J. King & L. Williams

Event: at Berkeley, CA, USA

Source: ORCID
Added: March 17, 2021

2013 conference paper

Measuring the Forensic-ability of Audit Logs for Nonrepudiation

Proceedings of the 2013 International Conference on Software Engineering, 1419–1422. http://dl.acm.org/citation.cfm?id=2486788.2487022

By: J. King

Event: at Piscataway, NJ, USA

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2012 journal article

Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse

3(2), 23–42.

By: J. King n, B. Smith n & L. Williams n

Event: at Hershey, PA, USA

Source: ORCID
Added: March 17, 2021

2012 conference paper

Modifying Without a Trace: General Audit Guidelines Are Inadequate for Open-source Electronic Health Record Audit Mechanisms

Proceedings of the 2Nd ACM SIGHIT International Health Informatics Symposium, 305–314.

By: J. King n, B. Smith n & L. Williams n

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021

2012 conference paper

Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry

Presented as part of the 3rd USENIX Workshop on Health Security and Privacy. Presented at the Bellevue, WA. https://www.usenix.org/conference/healthsec12/workshop-program/presentation/King

Event: at Bellevue, WA

Source: ORCID
Added: March 17, 2021

2010 conference paper

Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected

Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, 1–12.

By: B. Smith n, A. Austin n, M. Brown n, J. King n, J. Lankford n, A. Meneely n, L. Williams n

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021