Sarah Elder Elder, S., Zahan, N., Shu, R., Metro, M., Kozarev, V., Menzies, T., & Williams, L. (2022). Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application. EMPIRICAL SOFTWARE ENGINEERING, 27(6). https://doi.org/10.1007/s10664-022-10179-6 Elder, S. E., Zahan, N., Kozarev, V., Shu, R., Menzies, T., & Williams, L. (2021). Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard. 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: JOINT TRACK ON SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-JSEET 2021), pp. 95–104. https://doi.org/10.1109/ICSE-SEET52601.2021.00019 Elder, S. (2021). Vulnerability Detection is Just the Beginning. 2021 IEEE/ACM 43RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2021), pp. 304–308. https://doi.org/10.1109/ICSE-Companion52605.2021.00133 systematically developing prevention, detection, and response patterns for security requirements. (2016). 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67.