default search action
Byron J. Williams
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Kazi Zakia Sultana, Charles B. Boyd, Byron J. Williams:
A Software Vulnerability Prediction Model Using Traceable Code Patterns and Software Metrics. SN Comput. Sci. 4(5): 599 (2023) - 2020
- [c17]Kazi Zakia Sultana, Zadia Codabux, Byron J. Williams:
Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities. APSEC 2020: 31-40 - [c16]Grant Hernandez, Dave (Jing) Tian, Anurag Swarnim Yadav, Byron J. Williams, Kevin R. B. Butler:
BigMAC: Fine-Grained Policy Analysis of Android Firmware. USENIX Security Symposium 2020: 271-287 - [i1]Kazi Zakia Sultana, Zadia Codabux, Byron J. Williams:
Examining the Relationship of Code and Architectural Smells with Software Vulnerabilities. CoRR abs/2010.15978 (2020)
2010 – 2019
- 2019
- [j6]Kazi Zakia Sultana, Byron J. Williams, Tanmay Bhowmik:
A study examining relationships between micro patterns and security vulnerabilities. Softw. Qual. J. 27(1): 5-41 (2019) - 2018
- [c15]Kazi Zakia Sultana, Byron J. Williams, Amiangshu Bosu:
A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction. APSEC 2018: 355-364 - 2017
- [j5]Zadia Codabux, Kazi Zakia Sultana, Byron J. Williams:
The Relationship Between Code Smells and Traceable Patterns - Are They Measuring the Same Thing? Int. J. Softw. Eng. Knowl. Eng. 27(9-10): 1529-1548 (2017) - [j4]Zadia Codabux, Byron J. Williams, Gary L. Bradshaw, Murray Cantor:
An empirical assessment of technical debt practices in industry. J. Softw. Evol. Process. 29(10) (2017) - [c14]Kazi Zakia Sultana, Ajay Deo, Byron J. Williams:
Correlation Analysis among Java Nano-Patterns and Software Vulnerabilities. HASE 2017: 69-76 - [c13]Zadia Codabux, Kazi Zakia Sultana, Byron J. Williams:
The Relationship between Traceable Code Patterns and Code Smells. SEKE 2017: 444-449 - 2016
- [c12]Muhammad Nadeem, Byron J. Williams, Gary L. Bradshaw, Edward B. Allen:
Human Subject Evaluation of Computer-Security Training Recommender. COMPSAC 2016: 251-256 - [c11]Kazi Zakia Sultana, Ajay Deo, Byron J. Williams:
A Preliminary Study Examining Relationships Between Nano-Patterns and Software Security Vulnerabilities. COMPSAC 2016: 257-262 - [c10]Zadia Codabux, Byron J. Williams:
Technical debt prioritization using predictive analytics. ICSE (Companion Volume) 2016: 704-706 - 2015
- [c9]Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability Repositories. ITNG 2015: 534-539 - 2014
- [j3]Byron J. Williams, Jeffrey C. Carver:
Examination of the software architecture change characterization scheme using three empirical studies. Empir. Softw. Eng. 19(3): 419-464 (2014) - [c8]Isaac Griffith, Derek Reimanis, Clemente Izurieta, Zadia Codabux, Ajay Deo, Byron J. Williams:
The Correspondence Between Software Quality Models and Technical Debt Estimation Approaches. MTD@ICSME 2014: 19-26 - [c7]Muhammad Nadeem, Edward B. Allen, Byron J. Williams:
Computer Security Training Recommender for Developers. RecSys Posters 2014 - 2013
- [c6]Zadia Codabux, Byron J. Williams:
Managing technical debt: an industrial case study. MTD@ICSE 2013: 8-15 - [c5]Ajay Bandi, Byron J. Williams, Edward B. Allen:
Empirical evidence of code decay: A systematic mapping study. WCRE 2013: 341-350 - 2012
- [c4]Muhammad Nadeem, Byron J. Williams, Edward B. Allen:
High false positive detection of security vulnerabilities: a case study. ACM Southeast Regional Conference 2012: 359-360 - [c3]Puntitra Sawadpong, Edward B. Allen, Byron J. Williams:
Exception Handling Defects: An Empirical Study. HASE 2012: 90-97 - 2010
- [j2]Byron J. Williams, Jeffrey C. Carver:
Characterizing software architecture changes: A systematic review. Inf. Softw. Technol. 52(1): 31-51 (2010)
2000 – 2009
- 2007
- [c2]Byron J. Williams, Jeffrey C. Carver:
Characterizing Software Architecture Changes: An Initial Study. ESEM 2007: 410-419 - 2006
- [c1]Byron J. Williams, Jeffrey C. Carver, Rayford B. Vaughn:
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements. Software Engineering Research and Practice 2006: 966-971 - 2005
- [j1]Nicholas M. DeVito, Richard T. Emery, Kristin F. Kocan, William D. Roome, Byron J. Williams:
Functionality and structure of the service broker in advanced service architectures. Bell Labs Tech. J. 10(1): 17-30 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint