Validating software metrics: A spectrum of philosophies A Meneely, B Smith, L Williams ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (4), 1-28, 2013 | 133 | 2013 |
On guiding the augmentation of an automated test suite via mutation analysis BH Smith, L Williams Empirical software engineering 14, 341-369, 2009 | 91 | 2009 |
An empirical evaluation of the MuJava mutation operators BH Smith, L Williams Testing: Academic and Industrial Conference Practice and Research Techniques …, 2007 | 81 | 2007 |
Appendix B: iTrust electronic health care system case study A Meneely, B Smith, L Williams Software and Systems Traceability 1 (3), 409-425, 2012 | 80 | 2012 |
Truckers drive their own assessment for obstructive sleep apnea: a collaborative approach to online self-assessment for obstructive sleep apnea B Smith, BA Phillips Journal of clinical sleep medicine 7 (3), 241-245, 2011 | 63 | 2011 |
Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms JT King, B Smith, L Williams Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012 | 48 | 2012 |
Should software testers use mutation analysis to augment a test set? BH Smith, L Williams Journal of Systems and Software 82 (11), 1819-1832, 2009 | 48 | 2009 |
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams Proceedings of the second annual workshop on Security and privacy in medical …, 2010 | 47 | 2010 |
Using SQL hotspots in a prioritization heuristic for detecting all types of web application vulnerabilities B Smith, L Williams 2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011 | 37 | 2011 |
Assessing the accuracy of legal implementation readiness decisions AK Massey, B Smith, PN Otto, AI Antón 2011 IEEE 19th International Requirements Engineering Conference, 207-216, 2011 | 33 | 2011 |
On the effective use of security test patterns B Smith, L Williams 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 29 | 2012 |
Surveying security practice adherence in software development P Morrison, BH Smith, L Williams Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017 | 27 | 2017 |
Towards improved security criteria for certification of electronic health record systems A Austin, B Smith, L Williams Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care …, 2010 | 23 | 2010 |
A survey on code coverage as a stopping criterion for unit testing B Smith, LA Williams North Carolina State University. Dept. of Computer Science, 2008 | 23 | 2008 |
IBM Blockchain: An enterprise deployment of a distributed consensus-based transaction log B Smith, K Christidis Proc. Fourth International IBM Cloud Academy Conference 210, 2016 | 22 | 2016 |
Idea: using system level testing for revealing SQL injection-related error message information leaks B Smith, L Williams, A Austin International Symposium on Engineering Secure Software and Systems, 192-200, 2010 | 19 | 2010 |
Software metrics validation criteria: a systematic literature review A Meneely, B Smith, L Williams Department of Computer Science, North Carolina State University, Raleigh, NC …, 2010 | 18 | 2010 |
Proposing SQL statement coverage metrics B Smith, Y Shin, L Williams Proceedings of the fourth international workshop on Software engineering for …, 2008 | 16 | 2008 |
Measuring security practice use: A case study at IBM P Morrison, BH Smith, L Williams 2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in …, 2017 | 10 | 2017 |
Systematizing security test case planning using functional requirements phrases B Smith Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 10 | 2011 |