2021 conference paper
Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report
Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, 959–965.
Event: at New York, NY, USA
2020 article
Integrating Testing Throughout the CS Curriculum
2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), pp. 441–444.
2018 article
Developing Software Engineering Skills using Real Tools for Automated Grading
SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 794–799.
Event: at New York, NY, USA
2016 conference paper
Establishing a Baseline for Measuring Advancement in the Science of Security: An Analysis of the 2015 IEEE Security & Privacy Proceedings
Proceedings of the Symposium and Bootcamp on the Science of Security, 38–51.
Event: at New York, NY, USA
2016 journal article
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178.
2016 conference paper
Teaching Software Engineering Skills in CS1.5: Incorporating Real-world Practices and Tools (Abstract Only)
Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 696–697.
Event: at New York, NY, USA
2016 journal article
To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment
EMPIRICAL SOFTWARE ENGINEERING, 22(5), 2684–2717.
2015 conference paper
Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework (Abstract Only)
Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 677–677.
Event: at New York, NY, USA
2015 conference paper
Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 6:1–6:11.
Event: at New York, NY, USA
2015 report
Security Literature Review Paper Analysis Rubric
Technical Report #SERG-2015-01.
2014 conference paper
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
2014 ieee 22nd international requirements engineering conference (re), 183–192.
2014 conference paper
Log Your CRUD: Design Principles for Software Logging Mechanisms
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 5:1–5:10.
Event: at New York, NY, USA
2014 conference paper
Using Templates to Elicit Implied Security Requirements from Functional Requirements - a Controlled Experiment
Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 22:1–22:10.
Event: at New York, NY, USA
2013 conference paper
Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems
Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, 4–4. http://dl.acm.org/citation.cfm?id=2696523.2696527
Event: at Berkeley, CA, USA
2013 conference paper
Measuring the Forensic-ability of Audit Logs for Nonrepudiation
Proceedings of the 2013 International Conference on Software Engineering, 1419–1422. http://dl.acm.org/citation.cfm?id=2486788.2487022
Event: at Piscataway, NJ, USA
2012 journal article
Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse
3(2), 23–42.
Event: at Hershey, PA, USA
2012 conference paper
Modifying Without a Trace: General Audit Guidelines Are Inadequate for Open-source Electronic Health Record Audit Mechanisms
Proceedings of the 2Nd ACM SIGHIT International Health Informatics Symposium, 305–314.
Event: at New York, NY, USA
2012 conference paper
Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry
Presented as part of the 3rd USENIX Workshop on Health Security and Privacy. Presented at the Bellevue, WA. https://www.usenix.org/conference/healthsec12/workshop-program/presentation/King
Event: at Bellevue, WA
2010 conference paper
Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected
Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, 1–12.
Event: at New York, NY, USA
Updated: June 6th, 2024 17:32
2022 - present
2016 - 2022
Updated: June 6th, 2024 17:35
2011 - 2015
2009 - 2011
2005 - 2009
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.