Predicting vulnerable software components via text mining R Scandariato, J Walden, A Hovsepyan, W Joosen IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014 | 410 | 2014 |
Predicting vulnerable components: Software metrics vs text mining J Walden, J Stuckman, R Scandariato 2014 IEEE 25th international symposium on software reliability engineering …, 2014 | 260 | 2014 |
Software vulnerability prediction using text analysis techniques A Hovsepyan, R Scandariato, W Joosen, J Walden Proceedings of the 4th international workshop on Security measurements and …, 2012 | 141 | 2012 |
SU (3) breaking in neutral current axial matrix elements and the spin content of the nucleon MJ Savage, J Walden Physical Review D 55 (9), 5376, 1997 | 101 | 1997 |
Security of open source web applications J Walden, M Doyle, GA Welch, M Whelan 2009 3rd International Symposium on Empirical Software Engineering and …, 2009 | 84 | 2009 |
The effect of dimensionality reduction on software vulnerability prediction models J Stuckman, J Walden, R Scandariato IEEE Transactions on Reliability 66 (1), 17-37, 2016 | 69 | 2016 |
Static analysis versus penetration testing: A controlled experiment R Scandariato, J Walden, W Joosen 2013 IEEE 24th international symposium on software reliability engineering …, 2013 | 61 | 2013 |
Savi: Static-analysis vulnerability indicator J Walden, M Doyle IEEE Security & Privacy 10 (3), 32-39, 2012 | 55 | 2012 |
Final-state interactions and CP violation in K L→ π+ π− e+ e− JK Elwood, MB Wise, MJ Savage, JW Walden Physical Review D 53 (7), 4078, 1996 | 55 | 1996 |
An informatics perspective on computational thinking J Walden, M Doyle, R Garns, Z Hart Proceedings of the 18th ACM conference on innovation and technology in …, 2013 | 49 | 2013 |
Predicting vulnerable classes in an android application R Scandariato, J Walden Proceedings of the 4th international workshop on Security measurements and …, 2012 | 49 | 2012 |
The impact of a major security event on an open source project: The case of OpenSSL J Walden Proceedings of the 17th international conference on mining software …, 2020 | 42 | 2020 |
An empirical study of the evolution of PHP web application security M Doyle, J Walden 2011 Third International Workshop on Security Measurements and Metrics, 11-20, 2011 | 40 | 2011 |
Idea: java vs. php: security implications of language choice for web applications J Walden, M Doyle, R Lenhof, J Murray Engineering Secure Software and Systems: Second International Symposium …, 2010 | 31 | 2010 |
Secure software engineering teaching modules J Walden, CE Frank Proceedings of the 3rd annual conference on Information security curriculum …, 2006 | 30 | 2006 |
A real-time information warfare exercise on a virtual network J Walden Proceedings of the 36th SIGCSE technical symposium on Computer science …, 2005 | 25 | 2005 |
Integrating web application security into the IT curriculum J Walden Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008 | 19 | 2008 |
Profiling file repository access patterns for identifying data exfiltration activities Y Hu, C Frank, J Walden, E Crawford, D Kasturiratna 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011 | 17 | 2011 |
An effective log mining approach for database intrusion detection Y Hu, A Campan, J Walden, I Vorobyeva, J Shelton 2010 IEEE International Conference on Systems, Man and Cybernetics, 2299-2306, 2010 | 14 | 2010 |
The radiative charmed baryon decay Ξc20∗ å Ξc10γ M Lu, MJ Savage, J Walden Physics Letters B 369 (3-4), 337-340, 1996 | 14 | 1996 |