Follow
Patrick Morrison
Patrick Morrison
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
Challenges with applying vulnerability prediction models
P Morrison, K Herzig, B Murphy, L Williams
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-9, 2015
1562015
Is programming knowledge related to age? an exploration of stack overflow
P Morrison, E Murphy-Hill
2013 10th Working Conference on Mining Software Repositories (MSR), 69-72, 2013
872013
Approximating attack surfaces with stack traces
C Theisen, K Herzig, P Morrison, B Murphy, L Williams
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
712015
Mapping the field of software life cycle security metrics
P Morrison, D Moye, R Pandita, L Williams
Information and Software Technology 102, 146-159, 2018
692018
Stat! an interactive analytics environment for big data
M Barnett, B Chandramouli, R DeLine, S Drucker, D Fisher, J Goldstein, ...
Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013
442013
What questions do programmers ask about configuration as code?
A Rahman, A Partho, P Morrison, L Williams
Proceedings of the 4th International Workshop on Rapid Continuous Software …, 2018
412018
Are vulnerabilities discovered and resolved like other defects?
PJ Morrison, R Pandita, X Xiao, R Chillarege, L Williams
Proceedings of the 40th International Conference on Software Engineering …, 2018
402018
The credentials pattern
P Morrison, EB Fernandez
Proceedings of the 2006 conference on Pattern languages of programs, 1-4, 2006
322006
Surveying security practice adherence in software development
P Morrison, BH Smith, L Williams
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
232017
Securing the Broker Pattern.
P Morrison, EB Fernandez
EuroPLoP, 513-530, 2006
212006
A security practices evaluation framework
P Morrison
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 2 …, 2015
172015
Veteran developers' contributions and motivations: An open source perspective
P Morrison, R Pandita, E Murphy-Hill, A McLaughlin
2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2016
142016
Is programming knowledge related to age
P Morrison, E Murphy-Hill
In companion to the working conference on mining software repositories …, 2013
142013
Shhh!: 12 practices for secret management in infrastructure as code
A Rahman, FL Barsha, P Morrison
2021 IEEE Secure Development Conference (SecDev), 56-62, 2021
82021
Measuring security practice use: A case study at IBM
P Morrison, BH Smith, L Williams
2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in …, 2017
82017
Identifying security issues in software development: are keywords enough?
P Morrison, TD Oyetoyan, L Williams
Proceedings of the 40th International Conference on Software Engineering …, 2018
72018
A security practices evaluation framework
PJ Morrison
North Carolina State University, 2017
72017
Approximating attack surfaces with stack traces. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol. 2
C Theisen, K Herzig, P Morrison, B Murphy, L Williams
IEEE, 2015
72015
Proposing regulatory-driven automated test suites for electronic health record systems
P Morrison, C Holmgreen, A Massey, L Williams
2013 5th International Workshop on Software Engineering in Health Care (SEHC …, 2013
72013
Proposing regulatory-driven automated test suites
P Morrison, C Holmgreen, A Massey, L Williams
2013 Agile Conference, 11-21, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20