-
Kevic, K., C., Murphy, Williams, L., Beckman, J., Characterizing Experimentation in Continuous Deployment: A Case Study on Bing, International Conference on Software Engineering (ICSE) Software Engineering in Practice (SEIP) 2017, Buenos Aires, Argentina, to appear.
-
Rahman, A., Partho, A., Meder, D., and Williams, L., Which Factors Influence Usage of Build Automation Tools? International Conference on Software Engineering (ICSE), 3rd International Workshop on Rapid Continuous Software Engineering (RCoSE) 2017, Buenos Aires, Argentina, to appear.
-
Parnin, C., Helms, E, Atlee, C., Boughton, H., Ghattas, M., Glover, A., Holman, J., Micco, J., Murphy, B., Savor, T., Stumm, M., Whitaker, S., Williams, L., Top 10 Adages in Continuous Deployment, IEEE Software, to appear
-
Best Paper, Savor, T., Douglas, M., Gentili, M., Williams, L., Beck, K., Stumm, M., Continuous Deployment at Facebook and OANDA, International Conference on Software Engineering (ICSE 2016) Software Engineering in Practice, Austin, TX, Companion pp. 21-30.
-
Rahman, A. and Williams, L., Security in DevOps: Synthesizing Practitioners Perceptions and Practices, International Workshop on Continuous Software Evolution and Delivery at the International Conference on Software Engineering (ICSE) 2016, Austin, TX, to appear.
-
Rahman, A., Helms, E., Parnin, C., and Williams, L., Synthesizing Continuous Deployment Practices Used in Software Development, Agile 2015, Washington, DC, pp. 1-10.
-
Kafali, O., Jones, J., Petruso, M., Williams, L. and Singh, M., How Good is a Security Policy against Real Breaches? A HIPAA Case Study, International Conference on Software Engineering (ICSE) Software Engineering in Practice (SEIP) 2017, Buenos Aires, Argentina, to appear.
-
Theisen, C., Murphy, B., Kerzig, K., Williams, L., Risk-Based Attack Surface Approximation: How Much Data is Enough?, International Conference on Software Engineering (ICSE) Software Engineering in Practice (SEIP) 2017, Buenos Aires, Argentina, to appear.
-
King, J., Stallings, J., Riaz, M., and Williams, L., To Log, or Not to Log: Using Heuristics to Identify Mandatory Log Events – A Controlled Experiment, Empirical Software Engineering, doi:10.1007/s10664-016-9449-1, to appear.
-
Riaz, M., King, J., Massacci, F., Jenkins, M., Lopez, C. Q., and Williams, L., Identifying the Implied: Findings from Three Differentiated Replications on the Use of Security Requirements Templates, Empirical Software Engineering, 10.1007/s10664-016-9481-1, to appear.
-
Morrison, P. and Williams, L., Surveying Security Practice use in Software Development, Symposium and Bootcamp on the Science of Security (HotSoS) 2017, Hanover, MD, to appear
-
Burcham, M., Al-Zyoud, M., Carver, J., Alsaleh, M., Du, H., Gilani, F., Jiang, J., Rahman, A., Kafali, O., Al-Shaer, E., Williams, L., Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Paper, Symposium and Bootcamp on the Science of Security (HotSoS) 2017, Hanover, MD, to appear.
-
Morrison, P. and Williams, L., Measuring Security Practice Use: A Case Study At IBM, 3rd International Workshop on Rapid Continuous Software Engineering (RCoSE) 2017, 5th International Workshop on Conducting empirical studies in industry (CESI) 2017, Buenos Aires, Argentina, to appear
-
Rahman, A., Pradhan, P., Partho, A., and Williams, L., Predicting Android Application Security and Privacy Risk With Static Code Metrics, Short paper, 4th IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft) 2017, Buenos Aires, Argentina, to appear.
-
Riaz, M., Stallings, J., Singh, M., Slankas, J., and Williams, L., Discovering Goals for Security Requirements Engineering – DIGS Framework and Evaluation, International Symposium on Empirical Software Engineering and Measurement (ESEM) 2016, Ciudad Real, Spain, Article 35
-
Kafali, O., Singh, M., Williams, L. Identifying Misuse Cases for Digital Forensics using Temporal Norm Enactments, International Conference on Requirements Engineering (RE 2016), to appear.
-
Theisen, C., Williams, L., Oliver, K., and Murphy-Hill, E. Software Security Education at Scale, International Conference on Software Engineering (ICSE) Software Engineering Education and Training (SEET) track 2016, Austin, TX, 2016.
-
Riaz, M., Elder, S., and Williams, L., Prevention, Detection, and Response Patterns of Security Requirements, at Third International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE) at Requirements Engineering (RE) 2016, DOI 10.1109/REW.2016.025.
-
Carver, J., Burcham, M., Kocak, S. A., Bener, A., Felderer, M., Gander, M., King, J., Markkula, J., Oivo, M., Sauerwein, C. and Williams, L., Establishing a Baseline for Measuring Advancement in the Science of Security – an Analysis of the 2015 IEEE Security & Privacy Proceedings, Symposium and Bootcamp on the Science of Security (HotSoS) 2016, Pittsburgh, PA, pp. 38-51.
-
Theisen, C., Herzig, K., Morrison, P., Murphy, B., and Williams, L., Approximating Attack Surfaces with Stack Traces, International Conference on Software Engineering (ICSE) Software Engineering in Practice 2015, Florence, Italy.
-
King, J., Pandita, R., and Williams, L., Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events, Symposium and bootcamp on the Science of Security (HotSoS 2015), Urbana-Champaign, IL, Article 6.
-
Morrison, P., Herzig, K., Murphy, B. and Williams, L., Challenges with Applying Vulnerability Prediction Models, Symposium and bootcamp on the Science of Security (HotSoS 2015), Urbana-Champaign, IL, Article 4.
-
-
Pandita. R., Kunal, T., Tung, T., ICON: Inferring Temporal Constraints from Natural Language API Descriptions, International Conference on Software Maintenance and Evolution (ICSME) 2016, to appear.
-
Menzies, T., Williams, L., Zimmerman, T., Perspective in Data Science for Software Engineering, Morgan Kaufmann, 2016.
-
Pandita, R., Jetley, R., Sudarsan, S., and Williams, L., TMAP: Discoving Likely Mappings between APIs using Text Mining, 15th IEEE International Working Conference on Source Code Anaalysis and Manipulation (SCAM) 2015, Bremen, Germany, pp. 231 - 240.
-
Riaz, M., Breaux, T., and Williams, L., How Have We Evaluated Software Patterns in Problem Solving? A Systematic Mapping Study of Research Design Practices, Information and Software Technology, April 2015.
-
Murphy, B., Czerwonka, J., and Williams, L, Using Data to Make Decisions in Software Engineering: Providing a Method to Our Madness, in "The Art and Science of Analyzing Software Data" Bird, C., Menzies, T., and Zimmerman, T. (eds), Morgan Kaufmann, 2015.
-