Jason King King, J. (2021). Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report. Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, 959–965. https://doi.org/10.1145/3408877.3432476 Heckman, S., Schmidt, J. Y., & King, J. (2020). Integrating Testing Throughout the CS Curriculum. 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), pp. 441–444. https://doi.org/10.1109/ICSTW50294.2020.00079 Heckman, S., & King, J. (2018). Developing Software Engineering Skills using Real Tools for Automated Grading. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 794–799. https://doi.org/10.1145/3159450.3159595 Riaz, M., King, J., Slankas, J., Williams, L., Massacci, F., Quesada-Lopez, C., & Jenkins, M. (2017). Identifying the implied: Findings from three differentiated replications on the use of security requirements templates. EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178. https://doi.org/10.1007/s10664-016-9481-1 King, J., Stallings, J., Riaz, M., & Williams, L. (2017). To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment. EMPIRICAL SOFTWARE ENGINEERING, 22(5), 2684–2717. https://doi.org/10.1007/s10664-016-9449-1 Carver, J. C., Burcham, M., Kocak, S. A., Bener, A., Felderer, M., Gander, M., … Williams, L. (2016). Establishing a Baseline for Measuring Advancement in the Science of Security: An Analysis of the 2015 IEEE Security & Privacy Proceedings. Proceedings of the Symposium and Bootcamp on the Science of Security, 38–51. https://doi.org/10.1145/2898375.2898380 Heckman, S., & King, J. (2016). Teaching Software Engineering Skills in CS1.5: Incorporating Real-world Practices and Tools (Abstract Only). Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 696–697. https://doi.org/10.1145/2839509.2850562 Heckman, S., King, J., & Winters, M. (2015). Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework (Abstract Only). Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 677–677. https://doi.org/10.1145/2676723.2691921 King, J., Pandita, R., & Williams, L. (2015). Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events. Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 6:1–6:11. https://doi.org/10.1145/2746194.2746200 Bosu, A., Corley, C., Carver, J., Gander, M., King, J., Kocak, S., & Markkula, J. (2015). Security Literature Review Paper Analysis Rubric. Technical Report #SERG-2015-01. Riaz, M., King, J., Slankas, J., & Williams, L. (2014). Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. 2014 ieee 22nd international requirements engineering conference (re), 183–192. https://doi.org/10.1109/re.2014.6912260 King, J., & Williams, L. (2014). Log Your CRUD: Design Principles for Software Logging Mechanisms. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 5:1–5:10. https://doi.org/10.1145/2600176.2600183 Riaz, M., Slankas, J., King, J., & Williams, L. (2014). Using Templates to Elicit Implied Security Requirements from Functional Requirements - a Controlled Experiment. Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 22:1–22:10. https://doi.org/10.1145/2652524.2652532 King, J., & Williams, L. (2013). Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems. Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, 4–4. Retrieved from http://dl.acm.org/citation.cfm?id=2696523.2696527 King, J. (2013). Measuring the Forensic-ability of Audit Logs for Nonrepudiation. Proceedings of the 2013 International Conference on Software Engineering, 1419–1422. Retrieved from http://dl.acm.org/citation.cfm?id=2486788.2487022 King, J., Smith, B., & Williams, L. (2012). Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse. 3(2), 23–42. https://doi.org/10.4018/jcmam.2012040102 King, J. T., Smith, B., & Williams, L. (2012). Modifying Without a Trace: General Audit Guidelines Are Inadequate for Open-source Electronic Health Record Audit Mechanisms. Proceedings of the 2Nd ACM SIGHIT International Health Informatics Symposium, 305–314. https://doi.org/10.1145/2110363.2110399 Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry. (2012). Presented as part of the 3rd USENIX Workshop on Health Security and Privacy. Presented at the Bellevue, WA. Retrieved from https://www.usenix.org/conference/healthsec12/workshop-program/presentation/King Smith, B., Austin, A., Brown, M., King, J. T., Lankford, J., Meneely, A., & Williams, L. (2010). Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected. Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, 1–12. https://doi.org/10.1145/1866914.1866916