Byron J. Williams

Orcid: 0000-0002-5570-9733

According to our database1, Byron J. Williams authored at least 24 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics.
SN Comput. Sci., September, 2023

2020
BigMAC: Fine-Grained Policy Analysis of Android Firmware.
Proceedings of the 29th USENIX Security Symposium, 2020

Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2019
A study examining relationships between micro patterns and security vulnerabilities.
Softw. Qual. J., 2019

2018
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
An empirical assessment of technical debt practices in industry.
J. Softw. Evol. Process., 2017

The Relationship Between Code Smells and Traceable Patterns - Are They Measuring the Same Thing?
Int. J. Softw. Eng. Knowl. Eng., 2017

The Relationship between Traceable Code Patterns and Code Smells.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

2016
Technical debt prioritization using predictive analytics.
Proceedings of the 38th International Conference on Software Engineering, 2016

A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Human Subject Evaluation of Computer-Security Training Recommender.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories.
Proceedings of the 12th International Conference on Information Technology, 2015

2014
Examination of the software architecture change characterization scheme using three empirical studies.
Empir. Softw. Eng., 2014

Computer Security Training Recommender for Developers.
Proceedings of the Poster Proceedings of the 8th ACM Conference on Recommender Systems, 2014

The Correspondence Between Software Quality Models and Technical Debt Estimation Approaches.
Proceedings of the Sixth International Workshop on Managing Technical Debt, 2014

2013
Empirical evidence of code decay: A systematic mapping study.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

Managing technical debt: an industrial case study.
Proceedings of the 4th International Workshop on Managing Technical Debt, 2013

2012
Exception Handling Defects: An Empirical Study.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

High false positive detection of security vulnerabilities: a case study.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2010
Characterizing software architecture changes: A systematic review.
Inf. Softw. Technol., 2010

2007
Characterizing Software Architecture Changes: An Initial Study.
Proceedings of the First International Symposium on Empirical Software Engineering and Measurement, 2007

2006
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

2005
Functionality and structure of the service broker in advanced service architectures.
Bell Labs Tech. J., 2005


  Loading...