Validating software metrics: A spectrum of philosophies A Meneely, B Smith, L Williams ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (4), 1-28, 2013 | 136 | 2013 |
On guiding the augmentation of an automated test suite via mutation analysis BH Smith, L Williams Empirical software engineering 14, 341-369, 2009 | 93 | 2009 |
An empirical evaluation of the MuJava mutation operators BH Smith, L Williams Testing: Academic and Industrial Conference Practice and Research Techniques …, 2007 | 86 | 2007 |
Appendix B: iTrust electronic health care system case study A Meneely, B Smith, L Williams Software and Systems Traceability 425, 2012 | 77 | 2012 |
Truckers drive their own assessment for obstructive sleep apnea: a collaborative approach to online self-assessment for obstructive sleep apnea B Smith, BA Phillips Journal of clinical sleep medicine 7 (3), 241-245, 2011 | 64 | 2011 |
Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms JT King, B Smith, L Williams Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012 | 50 | 2012 |
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams Proceedings of the second annual workshop on Security and privacy in medical …, 2010 | 49 | 2010 |
Should software testers use mutation analysis to augment a test set? BH Smith, L Williams Journal of Systems and Software 82 (11), 1819-1832, 2009 | 48 | 2009 |
Using SQL hotspots in a prioritization heuristic for detecting all types of web application vulnerabilities B Smith, L Williams 2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011 | 38 | 2011 |
Assessing the accuracy of legal implementation readiness decisions AK Massey, B Smith, PN Otto, AI Antón 2011 IEEE 19th International Requirements Engineering Conference, 207-216, 2011 | 33 | 2011 |
On the effective use of security test patterns B Smith, L Williams 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 31 | 2012 |
Surveying security practice adherence in software development P Morrison, BH Smith, L Williams Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017 | 25 | 2017 |
Towards improved security criteria for certification of electronic health record systems A Austin, B Smith, L Williams Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care …, 2010 | 24 | 2010 |
IBM Blockchain: An enterprise deployment of a distributed consensus-based transaction log B Smith, K Christidis Proc. Fourth International IBM Cloud Academy Conference 210, 2016 | 22 | 2016 |
A survey on code coverage as a stopping criterion for unit testing B Smith, LA Williams North Carolina State University. Dept. of Computer Science, 2008 | 22 | 2008 |
Idea: using system level testing for revealing SQL injection-related error message information leaks B Smith, L Williams, A Austin Engineering Secure Software and Systems: Second International Symposium …, 2010 | 19 | 2010 |
Software metrics validation criteria: A systematic literature review A Meneely, B Smith, LA Williams North Carolina State University. Dept. of Computer Science, 2010 | 18 | 2010 |
Proposing SQL statement coverage metrics B Smith, Y Shin, L Williams Proceedings of the fourth international workshop on Software engineering for …, 2008 | 16 | 2008 |
Systematizing security test case planning using functional requirements phrases B Smith Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 11 | 2011 |
Climate Emergency, Urban Opportunity: The unique and crucial roles of national governments S Colenbrander, L Lazar, C Haddaoui, N Godfrey, A Lobo, H Clarkson, ... World Resources Institute and C40 Cities Climate Leadership Group, 2019 | 10 | 2019 |