Follow
Jason King
Title
Cited by
Cited by
Year
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts
M Riaz, J King, J Slankas, L Williams
2014 IEEE 22nd international requirements engineering conference (RE), 183-192, 2014
952014
Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms
JT King, B Smith, L Williams
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
492012
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected
B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams
Proceedings of the second annual workshop on Security and privacy in medical …, 2010
472010
Developing software engineering skills using real tools for automated grading
S Heckman, J King
Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018
452018
Using templates to elicit implied security requirements from functional requirements-a controlled experiment
M Riaz, J Slankas, J King, L Williams
Proceedings of the 8th ACM/IEEE International Symposium on Empirical …, 2014
262014
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates
M Riaz, J King, J Slankas, L Williams, F Massacci, C Quesada-López, ...
Empirical Software Engineering, 1-52, 0
26
Establishing a baseline for measuring advancement in the science of security: an analysis of the 2015 IEEE security & privacy proceedings
JC Carver, M Burcham, SA Kocak, A Bener, M Felderer, M Gander, J King, ...
Proceedings of the Symposium and Bootcamp on the Science of Security, 38-51, 2016
212016
Log your CRUD: design principles for software logging mechanisms
J King, L Williams
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 5, 2014
192014
To log, or not to log: using heuristics to identify mandatory log events–a controlled experiment
J King, J Stallings, M Riaz, L Williams
Empirical Software Engineering, 1-34, 2016
182016
Enabling forensics by proposing heuristics to identify mandatory log events
J King, R Pandita, L Williams
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 6, 2015
172015
Measuring the forensic-ability of audit logs for nonrepudiation
J King
Proceedings of the 2013 International Conference on Software Engineering …, 2013
112013
Integrating testing throughout the cs curriculum
S Heckman, JY Schmidt, J King
2020 IEEE International Conference on Software Testing, Verification and …, 2020
72020
Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems}
J King, L Williams
Presented as part of the 2013 USENIX Workshop on Health Information …, 2013
62013
Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse
J King, B Smith, L Williams
International Journal of Computational Models and Algorithms in Medicine …, 2012
52012
Secure logging and auditing in electronic health records systems: what can we learn from the payment card industry
J King, L Williams
Proceedings of the 3rd USENIX conference on Health Security and Privacy, 13-13, 2012
42012
Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report
J King
Proceedings of the 52nd ACM Technical Symposium on Computer Science …, 2021
32021
Teaching Software Engineering Skills in CS1. 5: Incorporating Real-world Practices and Tools
S Heckman, J King
Proceedings of the 47th ACM Technical Symposium on Computing Science …, 2016
32016
Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework
S Heckman, J King, M Winters
Proceedings of the 46th ACM Technical Symposium on Computer Science …, 2015
32015
Discovering security requirements from natural language project artifacts
J Slankas, M Riaz, J King, LA Williams
North Carolina State University. Dept. of Computer Science, 2013
22013
Measuring the Forensic-ability of User Activity Logs.
JT King
12015
The system can't perform the operation now. Try again later.
Articles 1–20