Charles Weir
Title
Cited by
Cited by
Year
Small memory software: patterns for systems with limited memory
J Noble, C Weir
Addison-Wesley Longman Publishing Co., Inc., 2001
1462001
Small memory software: patterns for systems with limited memory
J Noble, C Weir
Addison-Wesley Longman Publishing Co., Inc., 2001
1462001
A stitch in time: Supporting android developers in writingsecure code
DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
702017
Developers need support, too: A survey of security advice for software developers
Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl
2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017
562017
Organizing pointers to objects in an array to improve the speed of object retrieval
C Weir, T Wildenflycht
US Patent 7,890,492, 2011
552011
Searching for and providing objects using byte-by-byte comparison
C Weir, T Wildenflycht
US Patent 8,161,020, 2012
532012
I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security
C Weir, A Rashid, J Noble
Internet Society, 2017
152017
Reaching the masses: A new subdiscipline of app programmer education
C Weir, A Rashid, J Noble
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
142016
How to improve the security skills of mobile app developers? Comparing and contrasting expert views
C Weir, A Rashid, J Noble
Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 2016
132016
Patterns for designing in teams
C Weir
Pattern Languages of Program Design 3, 487-501, 1998
131998
A window in your pocket: Some small patterns for user interfaces
C Weir, J Noble
In Proc. European Pattern Languages of Programs. The Hillside Group, Inc, 2001
92001
A window in your pocket: Some small patterns for user interfaces
C Weir, J Noble
In Proc. European Pattern Languages of Programs. The Hillside Group, Inc, 2001
92001
From needs to actions to secure apps? the effect of requirements and developer practices on app security
C Weir, B Hermann, S Fahl
29th {USENIX} Security Symposium ({USENIX} Security 20), 289-305, 2020
82020
Interventions for software security: creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, A Sasse, A Rashid
2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019
72019
Light-touch interventions to improve software development security
C Weir, L Blair, I Becker, A Sasse, J Noble
2018 IEEE Cybersecurity Development (SecDev), 85-93, 2018
72018
Architectural Styles for Distribution Using Macro-Patterns for System Design
C Weir
in Frank Buschmann, Dirk Riehle (Eds.): Proceedings of the 1997 European …, 1997
71997
Patterns for managing limited memory
J Noble, C Weir
Proceedings of the Memory Preservation Society, 1-32, 1998
61998
Process Patterns for Personal Practice.
C Weir, J Noble
EuroPLoP, 413-424, 1999
51999
Interventions for long‐term software security: Creating a lightweight program of assurance techniques for developers
C Weir, I Becker, J Noble, L Blair, MA Sasse, A Rashid
Software: Practice and Experience 50 (3), 275-298, 2020
42020
Developer Essentials: Top Five Interventions to Support Secure Software Development
C Weir, A Rashid, J Noble
Lancaster University, 2017
32017
The system can't perform the operation now. Try again later.
Articles 1–20