关注
James Walden
James Walden
Director of the Center for Cybersecurity, Miami Uiversity
在 miamioh.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Predicting vulnerable software components via text mining
R Scandariato, J Walden, A Hovsepyan, W Joosen
IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014
4102014
Predicting vulnerable components: Software metrics vs text mining
J Walden, J Stuckman, R Scandariato
2014 IEEE 25th international symposium on software reliability engineering …, 2014
2602014
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
1412012
SU (3) breaking in neutral current axial matrix elements and the spin content of the nucleon
MJ Savage, J Walden
Physical Review D 55 (9), 5376, 1997
1011997
Security of open source web applications
J Walden, M Doyle, GA Welch, M Whelan
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
842009
The effect of dimensionality reduction on software vulnerability prediction models
J Stuckman, J Walden, R Scandariato
IEEE Transactions on Reliability 66 (1), 17-37, 2016
692016
Static analysis versus penetration testing: A controlled experiment
R Scandariato, J Walden, W Joosen
2013 IEEE 24th international symposium on software reliability engineering …, 2013
612013
Savi: Static-analysis vulnerability indicator
J Walden, M Doyle
IEEE Security & Privacy 10 (3), 32-39, 2012
552012
Final-state interactions and CP violation in K L→ π+ π− e+ e−
JK Elwood, MB Wise, MJ Savage, JW Walden
Physical Review D 53 (7), 4078, 1996
551996
An informatics perspective on computational thinking
J Walden, M Doyle, R Garns, Z Hart
Proceedings of the 18th ACM conference on innovation and technology in …, 2013
492013
Predicting vulnerable classes in an android application
R Scandariato, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
492012
The impact of a major security event on an open source project: The case of OpenSSL
J Walden
Proceedings of the 17th international conference on mining software …, 2020
422020
An empirical study of the evolution of PHP web application security
M Doyle, J Walden
2011 Third International Workshop on Security Measurements and Metrics, 11-20, 2011
402011
Idea: java vs. php: security implications of language choice for web applications
J Walden, M Doyle, R Lenhof, J Murray
Engineering Secure Software and Systems: Second International Symposium …, 2010
312010
Secure software engineering teaching modules
J Walden, CE Frank
Proceedings of the 3rd annual conference on Information security curriculum …, 2006
302006
A real-time information warfare exercise on a virtual network
J Walden
Proceedings of the 36th SIGCSE technical symposium on Computer science …, 2005
252005
Integrating web application security into the IT curriculum
J Walden
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
192008
Profiling file repository access patterns for identifying data exfiltration activities
Y Hu, C Frank, J Walden, E Crawford, D Kasturiratna
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011
172011
An effective log mining approach for database intrusion detection
Y Hu, A Campan, J Walden, I Vorobyeva, J Shelton
2010 IEEE International Conference on Systems, Man and Cybernetics, 2299-2306, 2010
142010
The radiative charmed baryon decay Ξc20∗ å Ξc10γ
M Lu, MJ Savage, J Walden
Physics Letters B 369 (3-4), 337-340, 1996
141996
系统目前无法执行此操作,请稍后再试。
文章 1–20