Laurie Williams

Works (70)

2020 journal article

Better together: Comparing vulnerability prediction models

INFORMATION AND SOFTWARE TECHNOLOGY, 119.

By: C. Theisen & L. Williams

Source: Web Of Science
Added: March 2, 2020

2019 journal article

A systematic mapping study of infrastructure as code research

INFORMATION AND SOFTWARE TECHNOLOGY, 108, 65–77.

By: A. Rahman, R. Mandavi-Hezaveh & L. Williams

Source: Web Of Science
Added: March 11, 2019

2019 article

How Do Developers Act on Static Analysis Alerts? An Empirical Study of Coverity Usage

2019 IEEE 30TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), pp. 323–333.

By: N. Imtiaz, B. Murphy & L. Williams

Source: Web Of Science
Added: July 13, 2020

2019 article

Share, But Be Aware: Security Smells in Python Gists

2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), pp. 536–540.

By: M. Rahman, A. Rahman & L. Williams

Source: Web Of Science
Added: April 14, 2020

2019 journal article

Source code properties of defective infrastructure as code scripts

INFORMATION AND SOFTWARE TECHNOLOGY, 112, 148–163.

By: A. Rahman & L. Williams

Source: Web Of Science
Added: June 17, 2019

2018 conference paper

Are Vulnerabilities Discovered and Resolved like Other Defects?

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 498–498.

Source: NC State University Libraries
Added: January 21, 2019

2018 journal article

Are vulnerabilities discovered and resolved like other defects?

Empirical Software Engineering, 23(3), 1383–1421.

By: P. Morrison, R. Pandita, X. Xiao, R. Chillarege & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2018 journal article

Attack surface definitions: A systematic literature review

INFORMATION AND SOFTWARE TECHNOLOGY, 104, 94–103.

By: C. Theisen, N. Munaiah, M. Al-Zyoud, J. Carver, A. Meneely & L. Williams

Source: NC State University Libraries
Added: November 19, 2018

2018 conference paper

Characterizing defective configuration scripts used for continuous deployment

Ieee international conference on software testing verification and, 34–45.

By: A. Rahman & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2018 conference paper

Continuously Integrating Security

2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SECURITY AWARENESS FROM DESIGN TO DEPLOYMENT (SEAD), 1–2.

By: L. Williams

Source: NC State University Libraries
Added: October 29, 2018

2018 conference paper

Identifying Security Issues in Software Development: Are Keywords Enough?

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 426–427.

By: P. Morrison, T. Oyetoyan & L. Williams

Source: NC State University Libraries
Added: December 3, 2018

2018 journal article

Mapping the field of software life cycle security metrics

INFORMATION AND SOFTWARE TECHNOLOGY, 102, 146–159.

By: P. Morrison, D. Moye, R. Pandita & L. Williams

Source: NC State University Libraries
Added: October 19, 2018

2018 conference paper

Poster: Defect Prediction Metrics for Infrastructure as Code Scripts in DevOps

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 414–415.

By: A. Rahman, J. Stallings & L. Williams

Source: NC State University Libraries
Added: December 3, 2018

2018 conference paper

What Questions Do Programmers Ask About Configuration as Code?

PROCEEDINGS 2018 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON RAPID CONTINUOUS SOFTWARE ENGINEERING (RCOSE), 16–22.

By: A. Rahman, A. Partho, P. Morrison & L. Williams

Source: NC State University Libraries
Added: January 21, 2019

2017 journal article

Highlights of the ACM student research competition

Communications of the ACM, 60(11), 5–5.

By: L. Williams & D. Baldwin

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Identifying the implied: Findings from three differentiated replications on the use of security requirements templates

Empirical Software Engineering, 22(4), 2127–2178.

By: M. Riaz, J. King, J. Slankas, L. Williams, F. Massacci, C. Quesada-Lopez, M. Jenkins

Source: NC State University Libraries
Added: August 6, 2018

2017 conference paper

The rising tide lifts all boats: The advancement of science in cyber security (invited talk)

ESEC/FSE 2017: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 1–1.

By: L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

The top 10 adages in continuous deployment

IEEE Software, 34(3), 86–95.

By: C. Parnin, E. Helms, C. Atlee, H. Boughton, M. Ghattas, A. Glover, J. Holman, J. Micco ...

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

To log, or not to log: Using heuristics to identify mandatory log events - a controlled experiment

Empirical Software Engineering, 22(5), 2684–2717.

By: J. King, J. Stallings, M. Riaz & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2017 article

Twist-3 distribution amplitudes of pion in the light-front quark model

Few-Body Systems, Vol. 58.

By: H. Choi & C. Ji

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

ICON: Inferring temporal constraints from natural language API descriptions

32nd ieee international conference on software maintenance and evolution (icsme 2016), 378–388.

By: R. Pandita, K. Taneja, T. Tung & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

NANE: Identifying misuse cases using temporal norm enactments

2016 ieee 24th international requirements engineering conference (re), 136–145.

By: O. Kafali, M. Singh & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Software security in DevOps: Synthesizing practitioners' perceptions and practices

International Workshop on Continuous Software Evolution and Delivery, CSED 2016, 70–76.

By: A. Rahman & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Stack traces reveal attack surfaces

Perspectives on Data Science for Software Engineering, 73–76.

By: C. Theisen & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Towards characterization of photo-excited electron transfer and catalysis in natural and artificial systems using xfels

Faraday Discussions, 194, 621–638.

By: R. Alonso-Mori, K. Asa, U. Bergmann, A. Brewster, R. Chatterjee, J. Cooper, H. Frei, F. Fuller ...

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Tutorial: text analytics for security

Symposium and Bootcamp on the Science of Security, 124–125.

By: T. Xie & W. Enck

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

systematically developing prevention, detection, and response patterns for security requirements

2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67.

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Discovering likely mappings between APIs using text mining

Ieee international working conference on source code analysis and, 231–240.

By: R. Pandita, R. Jetley, S. Sudarsan & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

How have we evaluated software pattern application? A systematic mapping study of research design practices

Information and Software Technology, 65, 14–38.

By: M. Riaz, T. Breaux & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Synthesizing continuous deployment practices used in software development

2015 AGILE Conference, 1–10.

By: A. Ur Rahman, E. Helms, L. Williams & C. Parnin

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

Hidden in plain sight: Automatically identifying security requirements from natural language artifacts

2014 ieee 22nd international requirements engineering conference (re), 183–192.

By: M. Riaz, J. King, J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

On coverage-based attack profiles

2014 IEEE Eighth International Conference on Software Security and Reliability - Companion (sere-c 2014), 5–6.

By: A. Rivers, M. Vouk & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

Towards a framework to measure security expertise in requirements analysis

2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 13–18.

By: H. Hibshi, T. Breaux, M. Riaz & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Towards the prioritization of system test cases

Software Testing Verification & Reliability, 24(4), 320–337.

By: H. Srikanth, S. Banerjee, L. Williams & J. Osborne

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

A comparison of the efficiency and effectiveness of vulnerability discovery techniques

Information and Software Technology, 55(7), 1279–1288.

By: A. Austin, C. Holmgreen & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Access control policy extraction from unconstrained natural language text

2013 ASE/IEEE International Conference on Social Computing (SocialCom), 435–440.

By: J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Automated extraction of non-functional requirements in available documentation

2013 1st International Workshop on Natural Language Analysis in Software Engineering (NaturaLiSE), 9–16.

By: J. Slankas & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

Can traditional fault prediction models be used for vulnerability prediction?

Empirical Software Engineering, 18(1), 25–59.

By: Y. Shin & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Non-operational testing of software for security issues

2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 21–22.

By: S. Subramani, M. Vouk & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Proposing regulatory-driven automated test suites

2013 AGILE conference (AGILE), 11–21.

By: P. Morrison, C. Holmgreen, A. Massey & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Proposing regulatory-driven automated test suites for electronic health record systems

2013 5th international workshop on software engineering in health care (sehc), 46–49.

By: P. Morrison, C. Holmgreen, A. Massey & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Validating software metrics: A spectrum of philosophies

ACM Transactions on Software Engineering and Methodology, 21(4).

By: A. Meneely, B. Smith & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

What Agile teams think of Agile principles

Communications of the ACM, 55(4), 71–76.

By: L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2011 review

A systematic literature review of actionable alert identification techniques for automated static code analysis

[Review of ]. Information and Software Technology, 53(4), 363–387.

By: S. Heckman & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

Socio-technical developer networks: Should we trust our measurements?

2011 33rd International Conference on Software Engineering (ICSE), 281–290.

By: A. Meneely & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Agile software development methodologies and practices

Advances in Computers, Vol 80, 80, 1–44.

By: L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Guest editorial: Special issue on software reliability engineering

Empirical Software Engineering, 15(4), 321–322.

By: L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

Idea: Using system level testing for revealing SQL injection-related error message information leaks

Engineering secure software and systems, proceedings, 5965, 192–200.

By: B. Smith, L. Williams & A. Austin

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Protection poker: The new software security "game"

IEEE Security & Privacy, 8(3), 14–20.

By: L. Williams, A. Meneely & G. Shipley

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

On automated prepared statement generation to remove SQL injection vulnerabilities

Information and Software Technology, 51(3), 589–598.

By: S. Thomas, L. Williams & T. Xie

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

On guiding the augmentation of an automated test suite via mutation analysis

Empirical Software Engineering, 14(3), 341–369.

By: B. Smith & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Secure open source collaboration: An empirical study of linus' law

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 453–462.

By: A. Meneely & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Should software testers use mutation analysis to augment a test set?

Journal of Systems and Software, 82(11), 1819–1832.

By: B. Smith & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Addressing diverse needs through a balance of agile and plan-driven software development methodologies in the core software engineering course

International Journal of Engineering Education, 24(4), 659–670.

By: L. Layman, L. Williams, K. Slaten, S. Berenson & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Realizing quality improvement through test driven development: results and experiences of four industrial teams

Empirical Software Engineering, 13(3), 289–302.

By: N. Nagappan, E. Maximilien, T. Bhat & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2007 journal article

On the design of more secure software-intensive systems by use of attack patterns

Information and Software Technology, 49(4), 381–397.

By: M. Gegick & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Essential communication practices for Extreme Programming in a global software development team

Information and Software Technology, 48(9), 781–794.

By: L. Layman, L. Williams, D. Damian & H. Bures

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Motivations and measurements in an agile case study

Journal of Systems Architecture, 52(11), 654–667.

By: L. Layman, L. Williams & L. Cunningham

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

On the value of static analysis for fault detection in software

IEEE Transactions on Software Engineering, 32(4), 240–253.

By: J. Zheng, L. Williams, N. Nagappan, W. Snipes, J. Hudepohl & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

A structured experiment of test-driven development

Information and Software Technology, 46(5), 337–342.

By: B. George & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2004 conference paper

On understanding compatibility of student pair programmers

Proceedings of the thirty-fifth SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004 : Norfolk, Virginia, USA, March 3-7, 2004.

Source: NC State University Libraries
Added: August 6, 2018

2003 chapter

Pair learning: With an eye toward future success

In Extreme programming and agile methods: XP/Agile Universe 2003: Third XP Agile Universe Conference, New Orleans, LA, USA, August 10-13, 2003 (Vol. 2753, pp. 185–198).

Source: NC State University Libraries
Added: August 6, 2018

2003 journal article

The XP programmer: The few-minutes programmer

IEEE Software, 20(3), 16–20.

By: L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2002 book

Extreme programming and agile methods XP/Agile Universe 2002 : Second XP Universe and First Agile Universe Conference, Chicago, IL, USA, August 4-7, 2002 : proceedings

Berlin ;|aNew York: Springer.

Source: NC State University Libraries
Added: August 6, 2018

2002 journal article

In support of paired programming in the introductory computer science course

Computer Science Education, 12(3), 197–212.

By: L. Williams, E. Wiebe, K. Yang, M. Ferzli & C. Miller

Source: NC State University Libraries
Added: August 6, 2018

2002 personal communication

Letters - Try it, you'll like it

By: L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2002 conference paper

Pair programming in an introductory computer science course: Initial results and recommendations

OOPSLA 2002: 17th ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications : conference proceedings: November 4-8, 2002, Washington State Convention and Trade Center, Seattle, Washington, USA. New York, NY: ACM Press.

By: L. Williams, K. Yang, E. Wiebe, M. Ferzli & C. Miller

Source: NC State University Libraries
Added: August 6, 2018

2002 journal article

Teaching PSP: Challenges and lessons learned

IEEE Software, 19(5), 42-.

By: J. Borstler, D. Carrington, G. Hislop, S. Lisack, K. Olson & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2000 journal article

Strengthening the case for pair programming

IEEE Software, 17(4), 19–25.

By: L. Williams, R. Kessler, W. Cunningham & R. Jeffries

Source: NC State University Libraries
Added: August 6, 2018

report

Distributed Pair Programming: Empirical Studies and Supporting Environments

Baheti, P., Williams, L., Gehringer, E., Stotts, D., & Smith, J. (pp. TR02–010). Chapel Hill, NC: Dept. of Computer Science, University of North Carolina.

By: P. Baheti, L. Williams, E. Gehringer, D. Stotts & J. Smith

Source: NC State University Libraries
Added: August 6, 2018