Ben H. Smith

According to our database1, Ben H. Smith authored at least 12 papers between 2008 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Measuring Security Practice Use: A Case Study at IBM.
Proceedings of the 5th IEEE/ACM International Workshop on Conducting Empirical Studies in Industry, 2017

Surveying Security Practice Adherence in Software Development.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

2012
Validating software metrics: A spectrum of philosophies.
ACM Trans. Softw. Eng. Methodol., 2012

Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse.
Int. J. Comput. Model. Algorithms Medicine, 2012

On the Effective Use of Security Test Patterns.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms.
Proceedings of the ACM International Health Informatics Symposium, 2012

2011
Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities.
Proceedings of the Fourth IEEE International Conference on Software Testing, 2011

2010
Towards improved security criteria for certification of electronic health record systems.
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care, 2010

Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks.
Proceedings of the Engineering Secure Software and Systems, Second International Symposium, 2010

2009
Should software testers use mutation analysis to augment a test set?
J. Syst. Softw., 2009

On guiding the augmentation of an automated test suite via mutation analysis.
Empir. Softw. Eng., 2009

2008
Proposing SQL statement coverage metrics.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008


  Loading...