default search action
Patrick Morrison
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c21]Patrick Morrison, John Slankas:
Evolving FinTech 512 'Software Engineering For Financial Technology'. SEENG 2023: 17-24 - 2022
- [i1]Shazibul Islam Shamim, Jonathan Alexander Gibson, Patrick Morrison, Akond Rahman:
Benefits, Challenges, and Research Topics: A Multi-vocal Literature Review of Kubernetes. CoRR abs/2211.07032 (2022) - 2021
- [j4]Tosin Daniel Oyetoyan, Patrick Morrison:
An improved text classification modelling approach to identify security messages in heterogeneous projects. Softw. Qual. J. 29(2): 509-553 (2021) - [c20]Farzana Ahamed Bhuiyan, Justin Murphy, Patrick Morrison, Akond Rahman:
Practitioner Perception of Vulnerability Discovery Strategies. EnCyCriS@ICSE 2021: 41-44 - [c19]Akond Rahman, Farhat Lamia Barsha, Patrick Morrison:
Shhh!: 12 Practices for Secret Management in Infrastructure as Code. SecDev 2021: 56-62 - 2020
- [c18]Farzana Ahamed Bhuiyan, Akond Rahman, Patrick Morrison:
Vulnerability discovery strategies used in software projects. ASE Workshops 2020: 13-18
2010 – 2019
- 2018
- [j3]Patrick Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? Empir. Softw. Eng. 23(3): 1383-1421 (2018) - [j2]Patrick Morrison, David Moye, Rahul Pandita, Laurie A. Williams:
Mapping the field of software life cycle security metrics. Inf. Softw. Technol. 102: 146-159 (2018) - [c17]Akond Rahman, Asif Partho, Patrick Morrison, Laurie A. Williams:
What questions do programmers ask about configuration as code? RCoSE@ICSE 2018: 16-22 - [c16]Patrick Morrison, Tosin Daniel Oyetoyan, Laurie A. Williams:
Identifying security issues in software development: are keywords enough? ICSE (Companion Volume) 2018: 426-427 - [c15]Patrick J. Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? ICSE 2018: 498 - 2017
- [c14]Patrick Morrison, Benjamin H. Smith, Laurie A. Williams:
Surveying Security Practice Adherence in Software Development. HotSoS 2017: 85-94 - [c13]Patrick Morrison, Benjamin H. Smith, Laurie A. Williams:
Measuring Security Practice Use: A Case Study at IBM. CESI@ICSE 2017: 16-22 - 2016
- [c12]Patrick Morrison, Rahul Pandita, Emerson R. Murphy-Hill, Anne McLaughlin:
Veteran developers' contributions and motivations: An open source perspective. VL/HCC 2016: 171-179 - 2015
- [j1]Patrick Morrison:
ICSE 2015 SIGSOFT CAPS Report. ACM SIGSOFT Softw. Eng. Notes 40(4): 33-34 (2015) - [c11]Patrick Morrison, Kim Herzig, Brendan Murphy, Laurie A. Williams:
Challenges with applying vulnerability prediction models. HotSoS 2015: 4:1-4:9 - [c10]Patrick Morrison:
Building a security practices evaluation framework. HotSoS 2015: 23:1-23:2 - [c9]Christopher Theisen, Kim Herzig, Patrick Morrison, Brendan Murphy, Laurie A. Williams:
Approximating Attack Surfaces with Stack Traces. ICSE (2) 2015: 199-208 - [c8]Patrick Morrison:
A Security Practices Evaluation Framework. ICSE (2) 2015: 935-938 - 2013
- [c7]Patrick Morrison, Casper Holmgreen, Aaron Massey, Laurie A. Williams:
Proposing Regulatory-Driven Automated Test Suites. AGILE 2013: 11-21 - [c6]Patrick Morrison, Casper Holmgreen, Aaron Massey, Laurie A. Williams:
Proposing regulatory-driven automated test suites for electronic health record systems. SEHC@ICSE 2013: 46-49 - [c5]Patrick Morrison, Emerson R. Murphy-Hill:
Is programming knowledge related to age? an exploration of stack overflow. MSR 2013: 69-72 - [c4]Mike Barnett, Badrish Chandramouli, Robert DeLine, Steven Mark Drucker, Danyel Fisher, Jonathan Goldstein, Patrick Morrison, John C. Platt:
Stat!: an interactive analytics environment for big data. SIGMOD Conference 2013: 1013-1016 - 2012
- [c3]Patrick Morrison, Laurie A. Williams:
An Analysis of HIPAA Breach Data. HealthSec 2012
2000 – 2009
- 2006
- [c2]Patrick Morrison, Eduardo B. Fernández:
Securing the Broker Pattern. EuroPLoP 2006: 513-530
1990 – 1999
- 1995
- [c1]Patrick Morrison:
Implementing Object Oriented Programming (OOP) In A Mainframe Environment. Int. CMG Conference 1995: 810-821
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint