Follow
James Walden
James Walden
Director of the Center for Cybersecurity, Miami Uiversity
Verified email at miamioh.edu
Title
Cited by
Cited by
Year
Predicting vulnerable software components via text mining
R Scandariato, J Walden, A Hovsepyan, W Joosen
IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014
4342014
Predicting vulnerable components: Software metrics vs text mining
J Walden, J Stuckman, R Scandariato
2014 IEEE 25th international symposium on software reliability engineering …, 2014
2752014
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
1532012
SU (3) breaking in neutral current axial matrix elements and the spin content of the nucleon
MJ Savage, J Walden
Physical Review D 55 (9), 5376, 1997
1011997
Security of open source web applications
J Walden, M Doyle, GA Welch, M Whelan
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
882009
The effect of dimensionality reduction on software vulnerability prediction models
J Stuckman, J Walden, R Scandariato
IEEE Transactions on Reliability 66 (1), 17-37, 2016
722016
Static analysis versus penetration testing: A controlled experiment
R Scandariato, J Walden, W Joosen
2013 IEEE 24th international symposium on software reliability engineering …, 2013
632013
Savi: Static-analysis vulnerability indicator
J Walden, M Doyle
IEEE Security & Privacy 10 (3), 32-39, 2012
582012
Final-state interactions and CP violation in K L→ π+ π− e+ e−
JK Elwood, MB Wise, MJ Savage, JW Walden
Physical Review D 53 (7), 4078, 1996
551996
An informatics perspective on computational thinking
J Walden, M Doyle, R Garns, Z Hart
Proceedings of the 18th ACM conference on innovation and technology in …, 2013
502013
Predicting vulnerable classes in an android application
R Scandariato, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
502012
The impact of a major security event on an open source project: The case of OpenSSL
J Walden
Proceedings of the 17th international conference on mining software …, 2020
452020
An empirical study of the evolution of PHP web application security
M Doyle, J Walden
2011 Third International Workshop on Security Measurements and Metrics, 11-20, 2011
422011
Idea: java vs. php: security implications of language choice for web applications
J Walden, M Doyle, R Lenhof, J Murray
Engineering Secure Software and Systems: Second International Symposium …, 2010
332010
Secure software engineering teaching modules
J Walden, CE Frank
Proceedings of the 3rd annual conference on Information security curriculum …, 2006
302006
A real-time information warfare exercise on a virtual network
J Walden
Proceedings of the 36th SIGCSE technical symposium on Computer science …, 2005
252005
Integrating web application security into the IT curriculum
J Walden
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
192008
Profiling file repository access patterns for identifying data exfiltration activities
Y Hu, C Frank, J Walden, E Crawford, D Kasturiratna
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011
172011
Inferential statistics
P Haden
The Cambridge handbook of computing education research, 133-172, 2019
142019
An effective log mining approach for database intrusion detection
Y Hu, A Campan, J Walden, I Vorobyeva, J Shelton
2010 IEEE International Conference on Systems, Man and Cybernetics, 2299-2306, 2010
142010
The system can't perform the operation now. Try again later.
Articles 1–20