Works (19)
2021 article
Combining Theory and Practice in Data Structures & Algorithms Course Projects
King, J. (2021, March 3). Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, pp. 959–965.
2020 article
Integrating Testing Throughout the CS Curriculum
Heckman, S., Schmidt, J. Y., & King, J. (2020, August 4). 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), pp. 441–444.
2018 article
Developing Software Engineering Skills using Real Tools for Automated Grading
Heckman, S., & King, J. (2018, February 21). SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 794–799.
2016 article
Establishing a baseline for measuring advancement in the science of security
Carver, J. C., Burcham, M., Kocak, S. A., Bener, A., Felderer, M., Gander, M., … Williams, L. (2016, April 14). Proceedings of the Symposium and Bootcamp on the Science of Security, pp. 38–51.
2016 article
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
Riaz, M., King, J., Slankas, J., Williams, L., Massacci, F., Quesada-López, C., & Jenkins, M. (2016, December 16). Empirical Software Engineering, Vol. 22, pp. 2127–2178.
2016 article
Teaching Software Engineering Skills in CS1.5
Heckman, S., & King, J. (2016, February 17). Proceedings of the 47th ACM Technical Symposium on Computing Science Education, pp. 696–697.
2016 article
To log, or not to log: using heuristics to identify mandatory log events – a controlled experiment
King, J., Stallings, J., Riaz, M., & Williams, L. (2016, August 24). Empirical Software Engineering, Vol. 22, pp. 2684–2717.
Contributors: n , J. Stallings n, M. Riaz n & L. Williams n
2015 article
Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework (Abstract Only)
Heckman, S., King, J., & Winters, M. (2015, February 24). Proceedings of the 46th ACM Technical Symposium on Computer Science Education, pp. 677–677.
2015 article
Enabling forensics by proposing heuristics to identify mandatory log events
King, J., Pandita, R., & Williams, L. (2015, April 17). Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, pp. 6:1–6:11.
2015 report
Security Literature Review Paper Analysis Rubric
Technical Report #SERG-2015-01.
2014 article
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
Riaz, M., King, J., Slankas, J., & Williams, L. (2014, August 1). 2014 Ieee 22nd International Requirements Engineering Conference (Re), pp. 183–192.
2014 article
Log your CRUD
King, J., & Williams, L. (2014, April 8). Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, pp. 5:1–5:10.
2014 article
Using templates to elicit implied security requirements from functional requirements - a controlled experiment
Riaz, M., Slankas, J., King, J., & Williams, L. (2014, September 5). Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 22:1–22:10.
2013 conference paper
Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems
Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, 4–4. http://dl.acm.org/citation.cfm?id=2696523.2696527
2013 conference paper
Measuring the Forensic-ability of Audit Logs for Nonrepudiation
Proceedings of the 2013 International Conference on Software Engineering, 1419–1422. http://dl.acm.org/citation.cfm?id=2486788.2487022
2012 article
Audit Mechanisms in Electronic Health Record Systems
King, J., Smith, B., & Williams, L. (2012, April 1). International Journal of Computational Models and Algorithms in Medicine, Vol. 3, pp. 23–42.
2012 article
Modifying without a trace
King, J. T., Smith, B., & Williams, L. (2012, January 28). Proceedings of the 2Nd ACM SIGHIT International Health Informatics Symposium, pp. 305–314.
2012 conference paper
Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry
Presented as part of the 3rd USENIX Workshop on Health Security and Privacy. Presented at the Bellevue, WA. https://www.usenix.org/conference/healthsec12/workshop-program/presentation/King
2010 article
Challenges for protecting the privacy of health information
Smith, B., Austin, A., Brown, M., King, J. T., Lankford, J., Meneely, A., & Williams, L. (2010, October 8). Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-Care Systems, pp. 1–12.
Employment
Updated: June 6th, 2024 17:32
2022 - present
2016 - 2022
Education
Updated: June 6th, 2024 17:35
2011 - 2015
2009 - 2011
2005 - 2009