Follow
Imano Williams
Title
Cited by
Cited by
Year
Evaluating the effectiveness of microsoft threat modeling tool
I Williams, X Yuan
Proceedings of the 2015 information security curriculum development …, 2015
352015
Developing Abuse Cases Based on Threat Modeling and Attack Patterns.
X Yuan, EB Nuakoh, I Williams, H Yu
J. Softw. 10 (4), 491-498, 2015
272015
An ontology based collaborative recommender system for security requirements elicitation
I Williams
2018 IEEE 26th International Requirements Engineering Conference (RE), 448-453, 2018
132018
Evaluating hands-on labs for teaching SQL injection: a comparative study
X Yuan, I Williams, TH Kim, J Xu, H Yu, JH Kim
Journal of Computing Sciences in Colleges 32 (4), 33-39, 2017
82017
A Method for Developing Abuse Cases and Its Evaluation
I Williams, X Yuan, JT McDonald, M Anwar
Journal of Software (JSW) 11 (5), 520-527, 2016
7*2016
Recommender systems for software requirements engineering: Current research & challenges
I Williams, X Yuan
2019 SoutheastCon, 1-6, 2019
42019
An automated security concerns recommender based on use case specification ontology
I Williams, X Yuan, M Anwar, JT McDonald
Automated Software Engineering 29 (2), 42, 2022
32022
A user study: Abuse cases derived from use case description and CAPEC attack patterns
I Williams, X Yuan
Information Science and Applications 2018: ICISA 2018, 239-249, 2019
32019
Evaluating a method to develop and rank abuse cases based on threat modeling, attack patterns and common weakness enumeration
I Williams
North Carolina Agricultural and Technical State University, 2015
32015
Identifying Security Concerns Based on a Use Case Ontology Framework.
I Williams, X Yuan
SEKE, 83-88, 2020
22020
Creating abuse cases based on attack patterns: A user study
I Williams, X Yuan
2017 IEEE Cybersecurity Development (SecDev), 85-86, 2017
22017
An Ontology-Driven System to Recommend Security Concerns and Attack Patterns for Web Applications
I Williams
North Carolina Agricultural and Technical State University, 2020
2020
EXPERIENCE AND OBSERVATIONS OF WEB-BASED COLLABORATIVE LEARNING IN A SOFTWARE SECURITY COURSE
X Yuan, I Williams, L Simpkins, JH Kim
INTED2017 Proceedings, 8045-8051, 2017
2017
Eliciting Security Requirements using Reusable Features from Use Cases
I Williams
The system can't perform the operation now. Try again later.
Articles 1–14