Josh Dehlinger

According to our database1, Josh Dehlinger authored at least 51 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Experimental Evaluation of Adversarial Attacks Against Natural Language Machine Learning Models.
Proceedings of the 21st IEEE/ACIS International Conference on Software Engineering Research, 2023

Reconstructing Android User Behavior through Timestamped State Models.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Towards Internet of Things (IoT) Forensics Analysis on Intelligent Robot Vacuum Systems.
Proceedings of the 20th IEEE/ACIS International Conference on Software Engineering Research, 2022

2021
Towards authentic undergraduate research experiences in software engineering and machine learning.
Proceedings of the EASEAI 2021: Proceedings of the 3rd International Workshop on Education through Advanced Software Engineering and Artificial Intelligence, 2021

Using Recurrent Neural Networks for Classification of Natural Language-based Non-functional Requirements.
Proceedings of the Joint Proceedings of REFSQ 2021 Workshops, 2021

Automatic Equivalent Mutants Classification Using Abstract Syntax Tree Neural Networks.
Proceedings of the 14th IEEE International Conference on Software Testing, 2021

Automatic Identification of Vulnerable Code: Investigations with an AST-Based Neural Network.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

2020
Teaching Software Testing with Free and Open Source Software.
Proceedings of the 13th IEEE International Conference on Software Testing, 2020

2019
Accredited Undergraduate Cybersecurity Degrees: Four Approaches.
Computer, 2019

Curious about Student Participation in Humanitarian Open Source Software?
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Project Achilles: A Prototype Tool for Static Method-Level Vulnerability Detection of Java Source Code Using a Recurrent Neural Network.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2019

Automatic Multi-class Non-Functional Software Requirements Classification Using Neural Networks.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
The Role of Mental Model in Graphical Password Selection and Design.
Proceedings of the Intelligent Human Systems Integration, 2018

2017
Designing video games for the blind: results of an empirical study.
Univers. Access Inf. Soc., 2017

Trading off usability and security in user interface design through mental models.
Behav. Inf. Technol., 2017

Community Engagement with Free and Open Source Software.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

2016
Challenges, lessons learned and results from establishing a CyberCorps: Scholarship for Service program targeting undergraduate students.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Usability Testing Results for a Mobile Medical Transition Application.
Proceedings of the Design, User Experience, and Usability: Novel User Experiences, 2016

2015
Getting to the Shalls: Facilitating Sensemaking in Requirements Engineering.
ACM Trans. Manag. Inf. Syst., 2015

2014
Developing and building a quality management system based on stakeholder behavior for enterprise architecture.
Proceedings of the 15th IEEE/ACIS International Conference on Software Engineering, 2014

Incorporating mobile computing into the CS curriculum (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Revitalizing the computer science undergraduate curriculum inside and outside of the classroom using mobile computing platforms (abstract only).
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014

Enabling static security vulnerability analysis in PHP applications for novice developers with <i>SSVChecker</i>.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014

A Privacy Policy Comparison of Health and Fitness Related Mobile Applications.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

Observed Gender Differences in Privacy Concerns and Behaviors of Mobile Device End Users.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

A Case Study Investigation of a Lightweight, Systematic Elicitation Approach for Enterprise Architecture Requirements.
Proceedings of the Evaluation of Novel Approaches to Software Engineering, 2014

Application of a Lightweight Enterprise Architecture Elicitation Technique Using a Case Study Approach.
Proceedings of the ENASE 2014, 2014

Encouraging privacy by design concepts with privacy policy auto-generation in eclipse (page).
Proceedings of the 2014 Workshop on Eclipse Technology eXchange, 2014

2013
A systematic literature review on using mobile computing as a learning intervention.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Designing, Implementing and Testing a Mobile Application to Assist with Pediatric-to-Adult Health Care Transition.
Proceedings of the Human-Computer Interaction. Applications and Services, 2013

The Design and Usability Testing of a Mobile Application to Aid in Child-to-Adult-Care Transition.
Proceedings of the HCI International 2013 - Posters' Extended Abstracts, 2013

2012
Enterprise Architecture: A Framework Based on Human Behavior Using the Theory of Structuration.
Proceedings of the Software Engineering Research, 2012

A Grounded Theoretical and Linguistic Analysis Approach for Non-Functional Requirements Analysis.
Proceedings of the International Conference on Information Systems, 2012

2011
Gaia-PL: A Product Line Engineering Approach for Efficiently Designing Multiagent Systems.
ACM Trans. Softw. Eng. Methodol., 2011

A model for piloting pathways for computational thinking in a general education curriculum.
Proceedings of the 42nd ACM technical symposium on Computer science education, 2011

Business Architecture Elicitation for Enterprise Architecture: VMOST versus Conventional Strategy Capture.
Proceedings of the 9th International Conference on Software Engineering Research, 2011

Examining Software Maintenance Processes in Small Organizations: Findings from a Case Study.
Proceedings of the Software Engineering Research, 2011

The Global Force Management Data Initiative: Implementing an Enterprise Information Exchange Data Model.
Proceedings of the 9th International Conference on Software Engineering Research, 2011

2010
On Applying the Theory of Structuration in Enterprise Architecture Design.
Proceedings of the 9th IEEE/ACIS International Conference on Computer and Information Science, 2010

2009
Applying the Grounded Theory Method to Derive Enterprise System Requirements.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

Evaluating the Reusability of Product-Line Software Fault Tree Analysis Assets for a Safety-Critical System.
Proceedings of the Formal Foundations of Reuse and Domain Engineering, 2009

2008
Dynamic Event/Fault Tree Analysis of Multi-agent Systems Using Galileo.
Proceedings of the Eighth International Conference on Quality Software, 2008

Supporting requirements reuse in multi-agent system product line design and evolution.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

2007
Safety analysis of software product lines using state-based modeling.
J. Syst. Softw., 2007

DECIMAL and PLFaultCAT: From Product-Line Requirements to Product-Line Member Software Fault Trees.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

State-Based Modeling to Support the Evolution and Maintenance of Safety-Critical Software Product Lines.
Proceedings of the 14th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2007), 2007

2006
PLFaultCAT: A Product-Line Software Fault Tree Analysis Tool.
Autom. Softw. Eng., 2006

SSVChecker: unifying static security vulnerability detection tools in an Eclipse plug-in.
Proceedings of the 2006 OOPSLA workshop on Eclipse Technology eXchange, 2006

2005
A product-line requirements approach to safe reuse in multi-agent systems.
ACM SIGSOFT Softw. Eng. Notes, 2005

A Product-Line Approach to Promote Asset Reuse in Multi-agent Systems.
Proceedings of the Software Engineering for Multi-Agent Systems IV, 2005

2004
Software Fault Tree Analysis for Product Lines.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004


  Loading...