James Walden
James Walden
Associate Professor of Computer Science, Northern Kentucky University
Verified email at nku.edu - Homepage
Title
Cited by
Cited by
Year
Predicting vulnerable software components via text mining
R Scandariato, J Walden, A Hovsepyan, W Joosen
IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014
2502014
Predicting vulnerable components: Software metrics vs text mining
J Walden, J Stuckman, R Scandariato
2014 IEEE 25th international symposium on software reliability engineering …, 2014
1772014
SU (3) breaking in neutral current axial matrix elements and the spin content of the nucleon
MJ Savage, J Walden
Physical Review D 55 (9), 5376, 1997
831997
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
822012
Security of open source web applications
J Walden, M Doyle, GA Welch, M Whelan
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
772009
Final-state interactions and CP violation in K L→ π+ π− e+ e−
JK Elwood, MB Wise, MJ Savage, JW Walden
Physical Review D 53 (7), 4078, 1996
571996
The effect of dimensionality reduction on software vulnerability prediction models
J Stuckman, J Walden, R Scandariato
IEEE Transactions on Reliability 66 (1), 17-37, 2016
482016
Static analysis versus penetration testing: A controlled experiment
R Scandariato, J Walden, W Joosen
2013 IEEE 24th international symposium on software reliability engineering …, 2013
482013
Savi: Static-analysis vulnerability indicator
J Walden, M Doyle
IEEE Security & Privacy 10 (3), 32-39, 2012
482012
Predicting vulnerable classes in an android application
R Scandariato, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
392012
An empirical study of the evolution of php web application security
M Doyle, J Walden
2011 Third International Workshop on Security Measurements and Metrics, 11-20, 2011
322011
An informatics perspective on computational thinking
J Walden, M Doyle, R Garns, Z Hart
Proceedings of the 18th ACM conference on innovation and technology in …, 2013
302013
Idea: java vs. php: security implications of language choice for web applications
J Walden, M Doyle, R Lenhof, J Murray
International Symposium on Engineering Secure Software and Systems, 61-69, 2010
292010
Secure software engineering teaching modules
J Walden, CE Frank
Proceedings of the 3rd annual conference on Information security curriculum …, 2006
242006
A real-time information warfare exercise on a virtual network
J Walden
Proceedings of the 36th SIGCSE technical symposium on Computer science …, 2005
212005
Integrating web application security into the IT curriculum
J Walden
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
192008
An effective log mining approach for database intrusion detection
Y Hu, A Campan, J Walden, I Vorobyeva, J Shelton
2010 IEEE International Conference on Systems, Man and Cybernetics, 2299-2306, 2010
142010
Profiling file repository access patterns for identifying data exfiltration activities
Y Hu, C Frank, J Walden, E Crawford, D Kasturiratna
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011
132011
The radiative charmed baryon decay Ξc20∗ å Ξc10γ
M Lu, MJ Savage, J Walden
Physics Letters B 369 (3-4), 337-340, 1996
131996
Eliminating SQL injection and cross site scripting using aspect oriented programming
B Simic, J Walden
International Symposium on Engineering Secure Software and Systems, 213-228, 2013
122013
The system can't perform the operation now. Try again later.
Articles 1–20