Name
Affiliation
Papers
LAURIE WILLIAMS
North Carolina State University
263
Collaborators
Citations 
PageRank 
330
4033
473.64
Referers 
Referees 
References 
5914
2858
2313
Search Limit
1001000
Title
Citations
PageRank
Year
Do I really need all this work to find vulnerabilities?00.342022
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue00.342022
Omni: automated ensemble with unexpected models against adversarial evasion attack00.342022
Why secret detection tools are not enough: It’s not just about false positives - An industrial case study00.342022
Improving Vulnerability Inspection Efficiency Using Active Learning40.372021
A comparative study of vulnerability reporting by software composition analysis tools00.342021
How To Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization)00.342021
Security Smells in Ansible and Chef Scripts: A Replication Study20.372021
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]00.342021
Understanding Software Security from Design to Deployment00.342020
The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code50.422020
Share, But be Aware: Security Smells in Python Gists10.352019
Science Leaves Clues00.342019
The seven sins: security smells in infrastructure as code scripts150.622019
Better Security Bug Report Classification via Hyperparameter Optimization.00.342019
Engineering Security Vulnerability Prevention, Detection, and Response.10.362018
A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER.00.342018
Continuously integrating security.00.342018
Toward extraction of security requirements from text: poster.00.342018
Mapping the field of software life cycle security metrics.30.382018
Attack surface definitions: A systematic literature review.20.402018
Software Engineering Research at the International Conference on Software Engineering in 2016.00.342017
Which Factors Influence Practitioners' Usage of Build Automation Tools?20.392017
The rising tide lifts all boats: the advancement of science in cyber security (invited talk)00.342017
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates.40.402017
Teaching Secure Software Development Through an Online Course.00.342017
Risk-Based Attack Surface Approximation: How Much Data Is Enough?70.482017
Writing good software engineering research papers: revisited.20.372017
Characterizing Experimentation in Continuous Deployment: A Case Study on Bing.110.542017
Measuring Security Practice Use: A Case Study at IBM.00.342017
DIGS: A Framework for Discovering Goals for Security Requirements Engineering.40.382016
A grounded analysis of experts' decision-making during security assessments.10.362016
ICON: Inferring Temporal Constraints from Natural Language API Descriptions.00.342016
Continuous deployment at Facebook and OANDA.280.982016
Software security education at scale.00.342016
Synthesizing Continuous Deployment Practices Used in Software Development201.002015
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts200.862014
Log your CRUD: design principles for software logging mechanisms.30.462014
Software Development Analytics (Dagstuhl Seminar 14261).10.412014
Using templates to elicit implied security requirements from functional requirements - a controlled experiment60.532014
Relation extraction for inferring access control rules from natural language artifacts.120.612014
On Coverage-Based Attack Profiles00.342014
An experience report for software quality evaluation in highly iterative development methodology using traditional metrics.40.482013
Using software reliability models for security assessment — Verification of assumptions10.432013
A comparative evaluation of static analysis actionable alert identification techniques50.432013
Non-operational testing of software for security issues10.432013
A comparison of the efficiency and effectiveness of vulnerability discovery techniques.120.612013
Have Agile Techniques been the Silver Bullet for Software Development at Microsoft?221.512013
An analysis of HIPAA breach data00.342012
What agile teams think of agile principles481.772012
  • 1
  • 2