Evaluating the effectiveness of microsoft threat modeling tool I Williams, X Yuan Proceedings of the 2015 information security curriculum development …, 2015 | 35 | 2015 |
Developing Abuse Cases Based on Threat Modeling and Attack Patterns. X Yuan, EB Nuakoh, I Williams, H Yu J. Softw. 10 (4), 491-498, 2015 | 27 | 2015 |
An ontology based collaborative recommender system for security requirements elicitation I Williams 2018 IEEE 26th International Requirements Engineering Conference (RE), 448-453, 2018 | 13 | 2018 |
Evaluating hands-on labs for teaching SQL injection: a comparative study X Yuan, I Williams, TH Kim, J Xu, H Yu, JH Kim Journal of Computing Sciences in Colleges 32 (4), 33-39, 2017 | 8 | 2017 |
A Method for Developing Abuse Cases and Its Evaluation I Williams, X Yuan, JT McDonald, M Anwar Journal of Software (JSW) 11 (5), 520-527, 2016 | 7* | 2016 |
Recommender systems for software requirements engineering: Current research & challenges I Williams, X Yuan 2019 SoutheastCon, 1-6, 2019 | 4 | 2019 |
An automated security concerns recommender based on use case specification ontology I Williams, X Yuan, M Anwar, JT McDonald Automated Software Engineering 29 (2), 42, 2022 | 3 | 2022 |
A user study: Abuse cases derived from use case description and CAPEC attack patterns I Williams, X Yuan Information Science and Applications 2018: ICISA 2018, 239-249, 2019 | 3 | 2019 |
Evaluating a method to develop and rank abuse cases based on threat modeling, attack patterns and common weakness enumeration I Williams North Carolina Agricultural and Technical State University, 2015 | 3 | 2015 |
Identifying Security Concerns Based on a Use Case Ontology Framework. I Williams, X Yuan SEKE, 83-88, 2020 | 2 | 2020 |
Creating abuse cases based on attack patterns: A user study I Williams, X Yuan 2017 IEEE Cybersecurity Development (SecDev), 85-86, 2017 | 2 | 2017 |
An Ontology-Driven System to Recommend Security Concerns and Attack Patterns for Web Applications I Williams North Carolina Agricultural and Technical State University, 2020 | | 2020 |
EXPERIENCE AND OBSERVATIONS OF WEB-BASED COLLABORATIVE LEARNING IN A SOFTWARE SECURITY COURSE X Yuan, I Williams, L Simpkins, JH Kim INTED2017 Proceedings, 8045-8051, 2017 | | 2017 |
Eliciting Security Requirements using Reusable Features from Use Cases I Williams | | |