Sarah Elder

Orcid: 0000-0002-5881-4619

According to our database1, Sarah Elder authored at least 9 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Comparing Effectiveness and Efficiency of Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) Tools in a Large Java-based System.
CoRR, 2023

2022
Do I really need all this work to find vulnerabilities?
Empir. Softw. Eng., 2022

Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application.
CoRR, 2022

2021
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Software Engineering Education and Training, 2021

Vulnerability Detection is Just the Beginning.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

2018
Categorizing Defects in Infrastructure as Code.
CoRR, 2018

A comparative analysis of manual methods for analyzing security requirements in regulatory documents: POSTER.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

2016
A cross-tool communication study on program analysis tool notifications.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Systematically Developing Prevention, Detection, and Response Patterns for Security Requirements.
Proceedings of the 24th IEEE International Requirements Engineering Conference, 2016


  Loading...