Stop the war!
Остановите войну!
for scientists:
default search action
Laurie A. Williams
Person information
- affiliation: North Carolina State University, Raleigh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j85]Sarah Elder, Md. Rayhanur Rahman, Gage Fringer, Kunal Kapoor, Laurie A. Williams:
A Survey on Software Vulnerability Exploitability Assessment. ACM Comput. Surv. 56(8): 205:1-205:41 (2024) - [j84]Laurie A. Williams:
Narrowing the Software Supply Chain Attack Vectors: The SSDF Is Wonderful but not Enough. IEEE Secur. Priv. 22(2): 4-7 (2024) - [c194]Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie A. Williams:
MalwareBench: Malware samples are not enough. MSR 2024: 728-732 - [c193]Sivana Hamer, Marcelo d'Amorim, Laurie A. Williams:
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers. SP (Workshops) 2024: 87-94 - [d1]Sivana Hamer, Marcelo d'Amorim, Laurie A. Williams:
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers. Zenodo, 2024 - [i46]Md. Rayhanur Rahman, Setu Kumar Basak, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports. CoRR abs/2401.01865 (2024) - [i45]Md. Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie A. Williams:
Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports. CoRR abs/2401.01883 (2024) - [i44]Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie A. Williams:
Shifting the Lens: Detecting Malware in npm Ecosystem with Large Language Models. CoRR abs/2403.12196 (2024) - [i43]Sivana Hamer, Marcelo d'Amorim, Laurie A. Williams:
Just another copy and paste? Comparing the security vulnerabilities of ChatGPT generated code and StackOverflow answers. CoRR abs/2403.15600 (2024) - [i42]Imranur Rahman, Nusrat Zahan, Stephen Magill, William Enck, Laurie A. Williams:
Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages. CoRR abs/2403.17382 (2024) - [i41]Setu Kumar Basak, K. Virgil English, Ken Ogura, Vitesh Kambara, Bradley Reaves, Laurie A. Williams:
AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts. CoRR abs/2403.19072 (2024) - [i40]Laurie A. Williams, Sammy Migues, Jamie Boote, Ben Hutchison:
Proactive Software Supply Chain Risk Management Framework (P-SSCRM) Version 1. CoRR abs/2404.12300 (2024) - [i39]Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2024-03: Industry Secure Supply Chain Summit. CoRR abs/2405.08762 (2024) - [i38]Sivana Hamer, Nasif Imtiaz, Mahzabin Tamanna, Preya Shabrina, Laurie A. Williams:
Trusting code in the wild: Exploring contributor reputation measures to review dependencies in the Rust ecosystem. CoRR abs/2406.10317 (2024) - 2023
- [j83]Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. ACM Comput. Surv. 55(12): 241:1-241:36 (2023) - [j82]Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j81]Nusrat Zahan, Elizabeth Lin, Mahzabin Tamanna, William Enck, Laurie A. Williams:
Software Bills of Materials Are Required. Are We There Yet? IEEE Secur. Priv. 21(2): 82-88 (2023) - [j80]Fabio Massacci, Laurie A. Williams:
Software Supply Chain Security [Guest Editors' Introduction]. IEEE Secur. Priv. 21(6): 8-10 (2023) - [j79]Nusrat Zahan, Parth Kanakiya, Brian Hambleton, Shohanuzzaman Shohan, Laurie A. Williams:
OpenSSF Scorecard: On the Path Toward Ecosystem-Wide Automated Security Metrics. IEEE Secur. Priv. 21(6): 76-88 (2023) - [j78]Nasif Imtiaz, Aniqa Khanom, Laurie A. Williams:
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages. IEEE Trans. Software Eng. 49(4): 1540-1560 (2023) - [j77]Nasif Imtiaz, Laurie A. Williams:
Are Your Dependencies Code Reviewed?: Measuring Code Review Coverage in Dependency Updates. IEEE Trans. Software Eng. 49(11): 4932-4945 (2023) - [c192]Setu Kumar Basak, Jamison Cox, Bradley Reaves, Laurie A. Williams:
A Comparative Study of Software Secrets Reporting by Secret Detection Tools. ESEM 2023: 1-12 - [c191]Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie A. Williams:
Do Software Security Practices Yield Fewer Vulnerabilities? ICSE-SEIP 2023: 292-303 - [c190]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? ICSE 2023: 1635-1647 - [c189]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
SecretBench: A Dataset of Software Secrets. MSR 2023: 347-351 - [i37]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? CoRR abs/2301.12377 (2023) - [i36]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
SecretBench: A Dataset of Software Secrets. CoRR abs/2303.06729 (2023) - [i35]Nasif Imtiaz, Preya Shabrina, Laurie A. Williams:
Trusting code in the wild: A social network-based centrality rating for developers in the Rust ecosystem. CoRR abs/2306.00240 (2023) - [i34]Setu Kumar Basak, Jamison Cox, Bradley Reaves, Laurie A. Williams:
A Comparative Study of Software Secrets Reporting by Secret Detection Tools. CoRR abs/2307.00714 (2023) - [i33]Mindy Tran, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. CoRR abs/2307.15642 (2023) - [i32]Trevor Dunlap, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. CoRR abs/2307.16557 (2023) - [i31]William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-06: Government Secure Supply Chain Summit. CoRR abs/2308.06850 (2023) - [i30]Aishwarya Seth, Saikath Bhattacharya, Sarah Elder, Nusrat Zahan, Laurie A. Williams:
Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System. CoRR abs/2312.17726 (2023) - [i29]Eric Bodden, Sam Weber, Laurie A. Williams:
Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 23181). Dagstuhl Reports 13(5): 1-21 (2023) - 2022
- [j76]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Omni: automated ensemble with unexpected models against adversarial evasion attack. Empir. Softw. Eng. 27(1): 26 (2022) - [j75]Md. Rayhanur Rahman, Nasif Imtiaz, Margaret-Anne D. Storey, Laurie A. Williams:
Why secret detection tools are not enough: It's not just about false positives - An industrial case study. Empir. Softw. Eng. 27(3): 59 (2022) - [j74]Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie A. Williams:
Do I really need all this work to find vulnerabilities? Empir. Softw. Eng. 27(6): 154 (2022) - [j73]William Enck, Laurie A. Williams:
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations. IEEE Secur. Priv. 20(2): 96-100 (2022) - [j72]Laurie A. Williams:
Trusting Trust: Humans in the Software Supply Chain Loop. IEEE Secur. Priv. 20(5): 7-10 (2022) - [j71]Charles Weir, Sammy Migues, Laurie A. Williams:
Exploring the Shift in Security Responsibility. IEEE Secur. Priv. 20(6): 8-17 (2022) - [j70]Rezvan Mahdavi-Hezaveh, Nirav Ajmeri, Laurie A. Williams:
Feature toggles as code: Heuristics and metrics for structuring feature toggles. Inf. Softw. Technol. 145: 106813 (2022) - [c188]Nusrat Zahan, Thomas Zimmermann, Patrice Godefroid, Brendan Murphy, Chandra Shekhar Maddila, Laurie A. Williams:
What are Weak Links in the npm Supply Chain? ICSE (SEIP) 2022: 331-340 - [c187]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue. MSR 2022: 144-155 - [c186]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What are the Practices for Secret Management in Software Artifacts? SecDev 2022: 69-76 - [i28]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue. CoRR abs/2203.11410 (2022) - [i27]Rui Shu, Tianpei Xia, Huy Tu, Laurie A. Williams, Tim Menzies:
Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning). CoRR abs/2205.00665 (2022) - [i26]Nasif Imtiaz, Laurie A. Williams:
Phantom Artifacts & Code Review Coverage in Dependency Updates. CoRR abs/2206.09422 (2022) - [i25]Sarah Elder, Nusrat Zahan, Rui Shu, Monica Metro, Valeri Kozarev, Tim Menzies, Laurie A. Williams:
Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application. CoRR abs/2208.01595 (2022) - [i24]Nusrat Zahan, Parth Kanakiya, Brian Hambleton, Shohanuzzaman Shohan, Laurie A. Williams:
PREPRINT: Can the OpenSSF Scorecard be used to measure the security posture of npm and PyPI? CoRR abs/2208.03412 (2022) - [i23]Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams:
What are the Practices for Secret Management in Software Artifacts? CoRR abs/2208.11280 (2022) - [i22]Md. Rayhanur Rahman, Laurie A. Williams:
From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts. CoRR abs/2210.02601 (2022) - [i21]Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie A. Williams:
PREPRINT: Do OpenSSF Scorecard Practices Contribute to Fewer Vulnerabilities? CoRR abs/2210.14884 (2022) - [i20]Md. Rayhanur Rahman, Laurie A. Williams:
Investigating co-occurrences of MITRE ATT\&CK Techniques. CoRR abs/2211.06495 (2022) - [i19]Md. Rayhanur Rahman, Laurie A. Williams:
An investigation of security controls and MITRE ATT&CK techniques. CoRR abs/2211.06500 (2022) - [i18]Rezvan Mahdavi-Hezaveh, Sameeha Fatima, Laurie A. Williams:
An Extended Model of Software Configuration. CoRR abs/2212.00505 (2022) - 2021
- [j69]Rezvan Mahdavi-Hezaveh, Jacob Dremann, Laurie A. Williams:
Software development with feature toggles: practices used by practitioners. Empir. Softw. Eng. 26(1): 1 (2021) - [j68]Rui Shu, Tianpei Xia, Jianfeng Chen, Laurie A. Williams, Tim Menzies:
How to Better Distinguish Security Bug Reports (Using Dual Hyperparameter Optimization). Empir. Softw. Eng. 26(3): 53 (2021) - [j67]Laurie A. Williams:
The People Who Live in Glass Houses Are Happy the Stones Weren't Thrown at Them [From the Editors]. IEEE Secur. Priv. 19(3): 4-7 (2021) - [j66]Akond Rahman, Laurie A. Williams:
Different Kind of Smells: Security Smells in Infrastructure as Code Scripts. IEEE Secur. Priv. 19(3): 33-41 (2021) - [j65]Akond Rahman, Md. Rayhanur Rahman, Chris Parnin, Laurie A. Williams:
Security Smells in Ansible and Chef Scripts: A Replication Study. ACM Trans. Softw. Eng. Methodol. 30(1): 3:1-3:31 (2021) - [j64]Zhe Yu, Christopher Theisen, Laurie A. Williams, Tim Menzies:
Improving Vulnerability Inspection Efficiency Using Active Learning. IEEE Trans. Software Eng. 47(11): 2401-2420 (2021) - [c185]Nasif Imtiaz, Seaver Thorn, Laurie A. Williams:
A comparative study of vulnerability reporting by software composition analysis tools. ESEM 2021: 5:1-5:11 - [c184]Sarah Elder, Nusrat Zahan, Valeri Kozarev, Rui Shu, Tim Menzies, Laurie A. Williams:
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard. ICSE (SEET) 2021: 95-104 - [c183]Saikath Bhattacharya, Munindar P. Singh, Laurie A. Williams:
Software Security Readiness and Deployment. ISSRE Workshops 2021: 298-299 - [c182]Charles Weir, Sammy Migues, Mike Ware, Laurie A. Williams:
Infiltrating security into development: exploring the world's largest software security study. ESEC/SIGSOFT FSE 2021: 1326-1336 - [i17]Sarah Elder, Nusrat Zahan, Val Kozarev, Rui Shu, Tim Menzies, Laurie A. Williams:
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard. CoRR abs/2103.05088 (2021) - [i16]Nasif Imtiaz, Laurie A. Williams:
Memory Error Detection in Security Testing. CoRR abs/2104.04385 (2021) - [i15]Nasif Imtiaz, Seaver Thorn, Laurie A. Williams:
A Comparative Study of Vulnerability Reporting by Software Composition Analysis Tools. CoRR abs/2108.12078 (2021) - [i14]Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey. CoRR abs/2109.06808 (2021) - [i13]Nasif Imtiaz, Aniqa Khanom, Laurie A. Williams:
Open or Sneaky? Fast or Slow? Light or Heavy?: Investigating Security Releases of Open Source Packages. CoRR abs/2112.06804 (2021) - [i12]Nusrat Zahan, Laurie A. Williams, Thomas Zimmermann, Patrice Godefroid, Brendan Murphy, Chandra Shekhar Maddila:
What are Weak Links in the npm Supply Chain? CoRR abs/2112.10165 (2021) - 2020
- [j63]Hui Guo, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh:
Çorba: crowdsourcing to obtain requirements from regulations and breaches. Empir. Softw. Eng. 25(1): 532-561 (2020) - [j62]Akond Rahman, Effat Farhana, Laurie A. Williams:
The 'as code' activities: development anti-patterns for infrastructure as code. Empir. Softw. Eng. 25(5): 3430-3467 (2020) - [j61]Christopher Theisen, Laurie A. Williams:
Better together: Comparing vulnerability prediction models. Inf. Softw. Technol. 119 (2020) - [j60]Mehdi Mirakhorli, Matthias Galster, Laurie A. Williams:
Understanding Software Security from Design to Deployment. ACM SIGSOFT Softw. Eng. Notes 45(2): 25-26 (2020) - [c181]Md. Rayhanur Rahman, William Enck, Laurie A. Williams:
Do configuration management tools make systems more secure?: an empirical research plan. HotSoS 2020: 23:1-23:2 - [c180]Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts. ICDM (Workshops) 2020: 516-525 - [c179]Akond Rahman, Effat Farhana, Chris Parnin, Laurie A. Williams:
Gang of eight: a defect taxonomy for infrastructure as code scripts. ICSE 2020: 752-764 - [i11]Akond Rahman, Effat Farhana, Laurie A. Williams:
The 'as Code' Activities: Development Anti-patterns for Infrastructure as Code. CoRR abs/2006.00177 (2020) - [i10]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Omni: Automated Ensemble with Unexpected Models against Adversarial Evasion Attack. CoRR abs/2011.12720 (2020)
2010 – 2019
- 2019
- [j59]Laurie A. Williams:
Science Leaves Clues. IEEE Secur. Priv. 17(5): 4-6 (2019) - [j58]Inger Anne Tøndel, Martin Gilje Jaatun, Daniela Soares Cruzes, Laurie A. Williams:
Collaborative security risk estimation in agile software development. Inf. Comput. Secur. 27(4) (2019) - [j57]Akond Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
A systematic mapping study of infrastructure as code research. Inf. Softw. Technol. 108: 65-77 (2019) - [j56]Akond Rahman, Laurie A. Williams:
Source code properties of defective infrastructure as code scripts. Inf. Softw. Technol. 112: 148-163 (2019) - [c178]Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie A. Williams, Andrew Meneely:
Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition. ESEM 2019: 1-6 - [c177]Akond Rahman, Laurie A. Williams:
A bird's eye view of knowledge needs related to penetration testing. HotSoS 2019: 9:1-9:2 - [c176]Nasif Imtiaz, Laurie A. Williams:
A synopsis of static analysis alerts on open source software. HotSoS 2019: 12:1-12:3 - [c175]Akond Rahman, Chris Parnin, Laurie A. Williams:
The seven sins: security smells in infrastructure as code scripts. ICSE 2019: 164-175 - [c174]Md. Rayhanur Rahman, Akond Rahman, Laurie A. Williams:
Share, But be Aware: Security Smells in Python Gists. ICSME 2019: 536-540 - [c173]Nasif Imtiaz, Brendan Murphy, Laurie A. Williams:
How Do Developers Act on Static Analysis Alerts? An Empirical Study of Coverity Usage. ISSRE 2019: 323-333 - [c172]Nasif Imtiaz, Akond Rahman, Effat Farhana, Laurie A. Williams:
Challenges with responding to static analysis tool alerts. MSR 2019: 245-249 - [i9]Rui Shu, Tianpei Xia, Laurie A. Williams, Tim Menzies:
Better Security Bug Report Classification via Hyperparameter Optimization. CoRR abs/1905.06872 (2019) - [i8]Rezvan Mahdavi-Hezaveh, Jacob Dremann, Laurie A. Williams:
Feature Toggle Driven Development: Practices usedby Practitioners. CoRR abs/1907.06157 (2019) - [i7]Akond Rahman, Md. Rayhanur Rahman, Chris Parnin, Laurie A. Williams:
Security Smells in Infrastructure as Code Scripts. CoRR abs/1907.07159 (2019) - [i6]Rui Shu, Tianpei Xia, Jianfeng Chen, Laurie A. Williams, Tim Menzies:
Improved Recognition of Security Bugs via Dual Hyperparameter Optimization. CoRR abs/1911.02476 (2019) - 2018
- [j55]Patrick Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? Empir. Softw. Eng. 23(3): 1383-1421 (2018) - [j54]Patrick Morrison, David Moye, Rahul Pandita, Laurie A. Williams:
Mapping the field of software life cycle security metrics. Inf. Softw. Technol. 102: 146-159 (2018) - [j53]Christopher Theisen, Nuthan Munaiah, Mahran Al-Zyoud, Jeffrey C. Carver, Andrew Meneely, Laurie A. Williams:
Attack surface definitions: A systematic literature review. Inf. Softw. Technol. 104: 94-103 (2018) - [j52]Laurie A. Williams, Gary McGraw, Sammy Migues:
Engineering Security Vulnerability Prevention, Detection, and Response. IEEE Softw. 35(5): 76-80 (2018) - [c171]Sarah Elder, Anna Mattapallil, Laurie A. Williams:
A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER. HotSoS 2018: 13:1 - [c170]Christopher Theisen, Laurie A. Williams:
How bad is it, really? an analysis of severity scores for vulnerabilities: poster. HotSoS 2018: 20:1 - [c169]Hui Guo, Özgür Kafali, Anne-Liz Jeukeng, Laurie A. Williams, Munindar P. Singh:
Toward extraction of security requirements from text: poster. HotSoS 2018: 27:1 - [c168]Laurie A. Williams:
Continuously integrating security. SEAD@ICSE 2018: 1-2 - [c167]Akond Rahman, Asif Partho, Patrick Morrison, Laurie A. Williams:
What questions do programmers ask about configuration as code? RCoSE@ICSE 2018: 16-22 - [c166]Akond Rahman, Jonathan Stallings, Laurie A. Williams:
Defect prediction metrics for infrastructure as code scripts in DevOps. ICSE (Companion Volume) 2018: 414-415 - [c165]Patrick Morrison, Tosin Daniel Oyetoyan, Laurie A. Williams:
Identifying security issues in software development: are keywords enough? ICSE (Companion Volume) 2018: 426-427 - [c164]Patrick J. Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? ICSE 2018: 498 - [c163]Akond Rahman, Laurie A. Williams:
Characterizing Defective Configuration Scripts Used for Continuous Deployment. ICST 2018: 34-45 - [c162]Christopher Theisen, Hyunwoo Sohn, Dawson Tripp, Laurie A. Williams:
BP: Profiling Vulnerabilities on the Attack Surface. SecDev 2018: 110-119 - [e9]Munindar P. Singh, Laurie A. Williams, Rick Kuhn, Tao Xie:
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, HoTSoS 2018, Raleigh, North Carolina, USA, April 10-11, 2018. ACM 2018 [contents] - [i5]Zhe Yu, Christopher Theisen, Hyunwoo Sohn, Laurie A. Williams, Tim Menzies:
Cost-aware Vulnerability Prediction: the HARMLESS Approach. CoRR abs/1803.06545 (2018) - [i4]Akond Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
Where Are The Gaps? A Systematic Mapping Study of Infrastructure as Code Research. CoRR abs/1807.04872 (2018) - [i3]Akond Rahman, Sarah Elder, Faysal Hossain Shezan, Vanessa Frost, Jonathan Stallings, Laurie A. Williams:
Categorizing Defects in Infrastructure as Code. CoRR abs/1809.07937 (2018) - [i2]Akond Rahman, Laurie A. Williams:
Source Code Properties of Defective Infrastructure as Code Scripts. CoRR abs/1810.09605 (2018) - 2017
- [j51]