publications: - title: "An informatics perspective on computational thinking" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Maureen Doyle" link: "https://researchr.org/alias/maureen-doyle" - name: "Rudy Garns" link: "https://researchr.org/alias/rudy-garns" - name: "Zachary Hart" link: "https://researchr.org/alias/zachary-hart" year: "2013" doi: "http://doi.acm.org/10.1145/2462476.2483797" links: doi: "http://doi.acm.org/10.1145/2462476.2483797" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/iticse/WaldenDGH13" researchr: "https://researchr.org/publication/WaldenDGH13" cites: 0 citedby: 0 pages: "4-9" booktitle: "iticse" kind: "inproceedings" key: "WaldenDGH13" - title: "SAVI: Static-Analysis Vulnerability Indicator" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Maureen Doyle" link: "https://researchr.org/alias/maureen-doyle" year: "2012" doi: "http://doi.ieeecomputersociety.org/10.1109/MSP.2012.1" links: doi: "http://doi.ieeecomputersociety.org/10.1109/MSP.2012.1" dblp: "http://dblp.uni-trier.de/rec/bibtex/journals/ieeesp/WaldenD12" researchr: "https://researchr.org/publication/WaldenD12" cites: 0 citedby: 0 journal: "ieeesp" volume: "10" number: "3" pages: "32-39" kind: "article" key: "WaldenD12" - title: "Security of open source web applications" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Maureen Doyle" link: "https://researchr.org/alias/maureen-doyle" - name: "Grant A. Welch" link: "https://researchr.org/alias/grant-a.-welch" - name: "Michael Whelan" link: "https://researchr.org/alias/michael-whelan" year: "2009" doi: "http://doi.acm.org/10.1145/1671248.1671292" links: doi: "http://doi.acm.org/10.1145/1671248.1671292" tags: - "source-to-source" - "security" - "web applications" - "open-source" researchr: "https://researchr.org/publication/WaldenDWW09" cites: 0 citedby: 0 pages: "545-553" booktitle: "esem" kind: "inproceedings" key: "WaldenDWW09" - title: "The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models" author: - name: "Jeffrey Stuckman" link: "https://researchr.org/alias/jeffrey-stuckman" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Riccardo Scandariato" link: "https://researchr.org/alias/riccardo-scandariato" year: "2017" doi: "http://dx.doi.org/10.1109/TR.2016.2630503" links: doi: "http://dx.doi.org/10.1109/TR.2016.2630503" dblp: "http://dblp.uni-trier.de/rec/bibtex/journals/tr/StuckmanWS17" researchr: "https://researchr.org/publication/StuckmanWS17" cites: 0 citedby: 0 journal: "tr" volume: "66" number: "1" pages: "17-37" kind: "article" key: "StuckmanWS17" - title: "Predicting Vulnerable Components: Software Metrics vs Text Mining" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Jeff Stuckman" link: "https://researchr.org/alias/jeff-stuckman" - name: "Riccardo Scandariato" link: "https://researchr.org/alias/riccardo-scandariato" year: "2014" doi: "http://dx.doi.org/10.1109/ISSRE.2014.32" links: doi: "http://dx.doi.org/10.1109/ISSRE.2014.32" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/issre/WaldenSS14" researchr: "https://researchr.org/publication/WaldenSS14" cites: 0 citedby: 0 pages: "23-33" booktitle: "issre" kind: "inproceedings" key: "WaldenSS14" - title: "An effective log mining approach for database intrusion detection" author: - name: "Yi Hu" link: "https://researchr.org/alias/yi-hu" - name: "Alina Campan" link: "https://researchr.org/alias/alina-campan" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Irina Vorobyeva" link: "https://researchr.org/alias/irina-vorobyeva" - name: "Justin Shelton" link: "https://researchr.org/alias/justin-shelton" year: "2010" doi: "http://dx.doi.org/10.1109/ICSMC.2010.5641988" links: doi: "http://dx.doi.org/10.1109/ICSMC.2010.5641988" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/smc/HuCWVS10" tags: - "database" - "systematic-approach" researchr: "https://researchr.org/publication/HuCWVS10" cites: 0 citedby: 0 pages: "2299-2306" booktitle: "SMC" kind: "inproceedings" key: "HuCWVS10" - title: "Predicting Vulnerable Software Components via Text Mining" author: - name: "Riccardo Scandariato" link: "https://researchr.org/alias/riccardo-scandariato" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Aram Hovsepyan" link: "https://researchr.org/alias/aram-hovsepyan" - name: "Wouter Joosen" link: "https://researchr.org/alias/wouter-joosen" year: "2014" doi: "http://dx.doi.org/10.1109/TSE.2014.2340398" links: doi: "http://dx.doi.org/10.1109/TSE.2014.2340398" dblp: "http://dblp.uni-trier.de/rec/bibtex/journals/tse/ScandariatoWHJ14" researchr: "https://researchr.org/publication/ScandariatoWHJ14" cites: 0 citedby: 0 journal: "TSE" volume: "40" number: "10" pages: "993-1006" kind: "article" key: "ScandariatoWHJ14" - title: "Static analysis versus penetration testing: A controlled experiment" author: - name: "Riccardo Scandariato" link: "https://researchr.org/alias/riccardo-scandariato" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Wouter Joosen" link: "https://researchr.org/alias/wouter-joosen" year: "2013" doi: "http://doi.ieeecomputersociety.org/10.1109/ISSRE.2013.6698898" links: doi: "http://doi.ieeecomputersociety.org/10.1109/ISSRE.2013.6698898" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/issre/ScandariatoWJ13" researchr: "https://researchr.org/publication/ScandariatoWJ13" cites: 0 citedby: 0 pages: "451-460" booktitle: "issre" kind: "inproceedings" key: "ScandariatoWJ13" - title: "Integrating web application security into the IT curriculum" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" year: "2008" doi: "http://doi.acm.org/10.1145/1414558.1414607" links: doi: "http://doi.acm.org/10.1145/1414558.1414607" tags: - "security" - "web applications" researchr: "https://researchr.org/publication/Walden08" cites: 0 citedby: 0 pages: "187-192" booktitle: "sigite" kind: "inproceedings" key: "Walden08" - title: "Accelerating e-commerce sites in the cloud" author: - name: "Wei Hao" link: "https://researchr.org/alias/wei-hao" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Chris Trenkamp" link: "https://researchr.org/alias/chris-trenkamp" year: "2013" doi: "http://dx.doi.org/10.1109/CCNC.2013.6488507" links: doi: "http://dx.doi.org/10.1109/CCNC.2013.6488507" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/ccnc/HaoWT13" researchr: "https://researchr.org/publication/HaoWT13" cites: 0 citedby: 0 pages: "605-608" booktitle: "ccnc" kind: "inproceedings" key: "HaoWT13" - title: "An Empirical Study of the Evolution of PHP Web Application Security" author: - name: "Maureen Doyle" link: "https://researchr.org/alias/maureen-doyle" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" year: "2011" doi: "https://doi.org/10.1109/Metrisec.2011.18" links: doi: "https://doi.org/10.1109/Metrisec.2011.18" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/esem/DoyleW11" researchr: "https://researchr.org/publication/DoyleW11" cites: 0 citedby: 0 pages: "11-20" booktitle: "esem" kind: "inproceedings" key: "DoyleW11" - title: "Secure software engineering teaching modules" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Charles E. Frank" link: "https://researchr.org/alias/charles-e.-frank" year: "2006" doi: "http://doi.acm.org/10.1145/1231047.1231052" links: doi: "http://doi.acm.org/10.1145/1231047.1231052" tags: - "software engineering" - "e-science" - "teaching" researchr: "https://researchr.org/publication/WaldenF06" cites: 0 citedby: 0 pages: "19-23" booktitle: "infoseccd" kind: "inproceedings" key: "WaldenF06" - title: "Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Maureen Doyle" link: "https://researchr.org/alias/maureen-doyle" - name: "Robert Lenhof" link: "https://researchr.org/alias/robert-lenhof" - name: "John Murray" link: "https://researchr.org/alias/john-murray" year: "2010" doi: "http://dx.doi.org/10.1007/978-3-642-11747-3_5" links: doi: "http://dx.doi.org/10.1007/978-3-642-11747-3_5" tags: - "Java" - "security" - "web applications" researchr: "https://researchr.org/publication/WaldenDLM10" cites: 0 citedby: 0 pages: "61-69" booktitle: "ESSoS" kind: "inproceedings" key: "WaldenDLM10" - title: "Using software birthmarks and clustering to identify similar classes and major functionalities" author: - name: "Matt Beck" link: "https://researchr.org/alias/matt-beck" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" year: "2018" doi: "https://doi.org/10.1145/3190645.3190677" links: doi: "https://doi.org/10.1145/3190645.3190677" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/ACMse/BeckW18" researchr: "https://researchr.org/publication/BeckW18-0" cites: 0 citedby: 0 booktitle: "ACMse" kind: "inproceedings" key: "BeckW18-0" - title: "Profiling file repository access patterns for identifying data exfiltration activities" author: - name: "Yi Hu" link: "https://researchr.org/alias/yi-hu" - name: "Charles E. Frank" link: "https://researchr.org/alias/charles-e.-frank" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Emily Crawford" link: "https://researchr.org/alias/emily-crawford" - name: "Dhanuja Kasturiratna" link: "https://researchr.org/alias/dhanuja-kasturiratna" year: "2011" doi: "http://dx.doi.org/10.1109/CICYBS.2011.5949404" links: doi: "http://dx.doi.org/10.1109/CICYBS.2011.5949404" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/cics/HuFWCK11" researchr: "https://researchr.org/publication/HuFWCK11" cites: 0 citedby: 0 pages: "122-128" booktitle: "cics" kind: "inproceedings" key: "HuFWCK11" - title: "Idea: Measuring the Effect of Code Complexity on Static Analysis Results" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Adam Messer" link: "https://researchr.org/alias/adam-messer" - name: "Alex Kuhl" link: "https://researchr.org/alias/alex-kuhl" year: "2009" doi: "http://dx.doi.org/10.1007/978-3-642-00199-4_17" links: doi: "http://dx.doi.org/10.1007/978-3-642-00199-4_17" tags: - "analysis" - "static analysis" researchr: "https://researchr.org/publication/WaldenMK09" cites: 0 citedby: 0 pages: "195-199" booktitle: "ESSoS" kind: "inproceedings" key: "WaldenMK09" - title: "Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming" author: - name: "Bojan Simic" link: "https://researchr.org/alias/bojan-simic" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" year: "2013" doi: "http://dx.doi.org/10.1007/978-3-642-36563-8_15" links: doi: "http://dx.doi.org/10.1007/978-3-642-36563-8_15" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/essos/SimicW13" researchr: "https://researchr.org/publication/SimicW13" cites: 0 citedby: 0 pages: "213-228" booktitle: "ESSoS" kind: "inproceedings" key: "SimicW13" - title: "A real-time information warfare exercise on a virtual network" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" year: "2005" doi: "http://doi.acm.org/10.1145/1047344.1047386" links: doi: "http://doi.acm.org/10.1145/1047344.1047386" researchr: "https://researchr.org/publication/Walden05" cites: 0 citedby: 0 pages: "86-90" booktitle: "sigcse" kind: "inproceedings" key: "Walden05" - title: "Work in progress - Does maintenance first improve student's understanding and appreciation of clean code and documentation" author: - name: "Maureen Doyle" link: "https://researchr.org/alias/maureen-doyle" - name: "Brooke Buckley" link: "https://researchr.org/alias/brooke-buckley" - name: "Wei Hao" link: "https://researchr.org/alias/wei-hao" - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" year: "2011" doi: "http://dx.doi.org/10.1109/FIE.2011.6142983" links: doi: "http://dx.doi.org/10.1109/FIE.2011.6142983" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/fie/DoyleBHW11" researchr: "https://researchr.org/publication/DoyleBHW11" cites: 0 citedby: 0 pages: "4" booktitle: "mcs" kind: "inproceedings" key: "DoyleBHW11" - title: "The Impact of a Major Security Event on an Open Source Project: The Case of OpenSSL" author: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" year: "2020" doi: "https://doi.org/10.1145/3379597.3387465" links: doi: "https://doi.org/10.1145/3379597.3387465" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/msr/Walden20" researchr: "https://researchr.org/publication/Walden20-0" cites: 0 citedby: 0 pages: "409-419" booktitle: "msr" kind: "inproceedings" key: "Walden20-0" - title: "Third International Workshop on Security Measurements and Metrics, Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011" year: "2011" doi: "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6165742" links: doi: "http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6165742" dblp: "http://dblp.uni-trier.de/rec/bibtex/conf/esem/2011metrisec" researchr: "https://researchr.org/publication/esem-2011metrisec" cites: 0 citedby: 0 booktitle: "Third International Workshop on Security Measurements and Metrics, Metrisec@ESEM 2011, Banff, Alberta, Canada, September 21, 2011" conference: "esem" editor: - name: "James Walden" link: "https://faculty.cs.nku.edu/~waldenj/" - name: "Laurie Williams" link: "https://researchr.org/alias/laurie-williams" publisher: "IEEE" isbn: "978-1-4673-1245-5" kind: "proceedings" key: "esem-2011metrisec"