2009 |
7 | EE | Laurie Williams,
Michael Gegick,
Andrew Meneely:
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer.
ESSoS 2009: 122-134 |
6 | EE | Michael Gegick,
Pete Rotella,
Laurie Williams:
Toward Non-security Failures as a Predictor of Security Faults and Failures.
ESSoS 2009: 135-149 |
2008 |
5 | EE | Michael Gegick,
Laurie Williams:
Ranking Attack-Prone Components with a Predictive Model.
ISSRE 2008: 315-316 |
4 | EE | Michael Gegick:
Failure-prone components are also attack-prone components.
OOPSLA Companion 2008: 917-918 |
3 | EE | Michael Gegick,
Laurie Williams,
Jason Osborne,
Mladen A. Vouk:
Prioritizing software security fortification throughcode-level metrics.
QoP 2008: 31-38 |
2007 |
2 | EE | Michael Gegick,
Laurie Williams:
On the design of more secure software-intensive systems by use of attack patterns.
Information & Software Technology 49(4): 381-397 (2007) |
2005 |
1 | EE | Michael Gegick,
Laurie Williams:
Matching attack patterns to security vulnerabilities in software-intensive system designs.
ACM SIGSOFT Software Engineering Notes 30(4): 1-7 (2005) |