James Walden
James Walden
Director of the Center for Cybersecurity, Miami Uiversity
Verified email at
Cited by
Cited by
Predicting vulnerable software components via text mining
R Scandariato, J Walden, A Hovsepyan, W Joosen
IEEE Transactions on Software Engineering 40 (10), 993-1006, 2014
Predicting vulnerable components: Software metrics vs text mining
J Walden, J Stuckman, R Scandariato
2014 IEEE 25th international symposium on software reliability engineering …, 2014
Software vulnerability prediction using text analysis techniques
A Hovsepyan, R Scandariato, W Joosen, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
SU (3) breaking in neutral current axial matrix elements and the spin content of the nucleon
MJ Savage, J Walden
Physical Review D 55 (9), 5376, 1997
Security of open source web applications
J Walden, M Doyle, GA Welch, M Whelan
2009 3rd International Symposium on Empirical Software Engineering and …, 2009
The effect of dimensionality reduction on software vulnerability prediction models
J Stuckman, J Walden, R Scandariato
IEEE Transactions on Reliability 66 (1), 17-37, 2016
Static analysis versus penetration testing: A controlled experiment
R Scandariato, J Walden, W Joosen
2013 IEEE 24th international symposium on software reliability engineering …, 2013
Final-state interactions and CP violation in K L→ π+ π− e+ e−
JK Elwood, MB Wise, MJ Savage, JW Walden
Physical Review D 53 (7), 4078, 1996
Savi: Static-analysis vulnerability indicator
J Walden, M Doyle
IEEE Security & Privacy 10 (3), 32-39, 2012
Predicting vulnerable classes in an android application
R Scandariato, J Walden
Proceedings of the 4th international workshop on Security measurements and …, 2012
An informatics perspective on computational thinking
J Walden, M Doyle, R Garns, Z Hart
Proceedings of the 18th ACM conference on innovation and technology in …, 2013
An empirical study of the evolution of PHP web application security
M Doyle, J Walden
2011 Third International Workshop on Security Measurements and Metrics, 11-20, 2011
The impact of a major security event on an open source project: The case of OpenSSL
J Walden
Proceedings of the 17th international conference on mining software …, 2020
Idea: java vs. php: security implications of language choice for web applications
J Walden, M Doyle, R Lenhof, J Murray
Engineering Secure Software and Systems: Second International Symposium …, 2010
Secure software engineering teaching modules
J Walden, CE Frank
Proceedings of the 3rd annual conference on Information security curriculum …, 2006
A real-time information warfare exercise on a virtual network
J Walden
Proceedings of the 36th SIGCSE technical symposium on Computer science …, 2005
Integrating web application security into the IT curriculum
J Walden
Proceedings of the 9th ACM SIGITE conference on Information technology …, 2008
Profiling file repository access patterns for identifying data exfiltration activities
Y Hu, C Frank, J Walden, E Crawford, D Kasturiratna
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2011
An effective log mining approach for database intrusion detection
Y Hu, A Campan, J Walden, I Vorobyeva, J Shelton
2010 IEEE International Conference on Systems, Man and Cybernetics, 2299-2306, 2010
The radiative charmed baryon decay Ξc20∗ å Ξc10γ
M Lu, MJ Savage, J Walden
Physics Letters B 369 (3-4), 337-340, 1996
The system can't perform the operation now. Try again later.
Articles 1–20