Follow
Byron J. Williams
Byron J. Williams
University of Florida
Verified email at drbw.me
Title
Cited by
Cited by
Year
Characterizing software architecture changes: A systematic review
BJ Williams, JC Carver
Information and Software Technology 52 (1), 31-51, 2010
2142010
Managing technical debt: An industrial case study
Z Codabux, B Williams
2013 4th International Workshop on Managing Technical Debt (MTD), 8-15, 2013
1812013
Exception handling defects: An empirical study
P Sawadpong, EB Allen, BJ Williams
2012 IEEE 14th International Symposium on High-Assurance Systems Engineering …, 2012
602012
The correspondence between software quality models and technical debt estimation approaches
I Griffith, D Reimanis, C Izurieta, Z Codabux, A Deo, B Williams
2014 sixth international workshop on managing technical debt, 19-26, 2014
472014
Long-timescale fluctuations in zero-field magnetic vortex oscillations driven by dc spin-polarized current
VS Pribiag, G Finocchio, BJ Williams, DC Ralph, RA Buhrman
Physical Review B—Condensed Matter and Materials Physics 80 (18), 180411, 2009
472009
Change Risk Assessment: Understanding Risks Involved in Changing Software Requirements.
BJ Williams, JC Carver, RB Vaughn
Software Engineering Research and Practice, 966-971, 2006
422006
{BigMAC}:{Fine-Grained} policy analysis of android firmware
G Hernandez, DJ Tian, AS Yadav, BJ Williams, KRB Butler
29th USENIX Security Symposium (USENIX Security 20), 271-287, 2020
362020
An empirical assessment of technical debt practices in industry
Z Codabux, BJ Williams, GL Bradshaw, M Cantor
Journal of software: Evolution and Process 29 (10), e1894, 2017
362017
Technical debt prioritization using predictive analytics
Z Codabux, BJ Williams
Proceedings of the 38th International Conference on Software Engineering …, 2016
362016
Empirical evidence of code decay: A systematic mapping study
A Bandi, BJ Williams, EB Allen
2013 20th Working Conference on Reverse Engineering (WCRE), 341-350, 2013
352013
High false positive detection of security vulnerabilities: a case study
M Nadeem, BJ Williams, EB Allen
Proceedings of the 50th Annual Southeast Regional Conference, 359-360, 2012
272012
Cyber security for emergency management
J Walker, BJ Williams, GW Skelton
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
262010
Correlation analysis among java nano-patterns and software vulnerabilities
KZ Sultana, A Deo, BJ Williams
2017 IEEE 18th International Symposium on High Assurance Systems Engineering …, 2017
252017
A preliminary study examining relationships between nano-patterns and software security vulnerabilities
KZ Sultana, A Deo, BJ Williams
2016 IEEE 40th annual computer software and applications conference (COMPSAC …, 2016
212016
A quality assurance approach to technical debt
Z Codabux, BJ Williams, N Niu
Proceedings of the International Conference on Software Engineering Research …, 2014
202014
Permpress: Machine learning-based pipeline to evaluate permissions in app privacy policies
MS Rahman, P Naghavi, B Kojusner, S Afroz, B Williams, S Rampazzi, ...
IEEE Access 10, 89248-89269, 2022
182022
Examining the relationship of code and architectural smells with software vulnerabilities
KZ Sultana, Z Codabux, B Williams
2020 27th Asia-Pacific Software Engineering Conference (APSEC), 31-40, 2020
162020
Examination of the software architecture change characterization scheme using three empirical studies
BJ Williams, JC Carver
Empirical Software Engineering 19, 419-464, 2014
162014
Evaluating micro patterns and software metrics in vulnerability prediction
KZ Sultana, BJ Williams
2017 6th International Workshop on Software Mining (SoftwareMining), 40-47, 2017
152017
Preliminary study on assessing software defects using nano-pattern detection
A Deo, BJ Williams
Proceedings of the 24th International Conference on Software Engineering and …, 2015
152015
The system can't perform the operation now. Try again later.
Articles 1–20