Automatically identifying location information in text data DD Hein, NJ Bishop, JB Yonker US Patent 8,331,958, 2012 | 84 | 2012 |
Secure software engineering: Learning from the past to address future challenges D Hein, H Saiedian Information Security Journal: A Global Perspective 18 (1), 8-25, 2009 | 34 | 2009 |
A survey of client‐side Web threats and counter‐threat measures D Hein, S Morozov, H Saiedian Security and Communication Networks 5 (5), 535-544, 2012 | 10 | 2012 |
A tagging approach to extract security requirements in non-traditional software development processes A Tetmeyer, D Hein, H Saiedian International Journal of Secure Software Engineering (IJSSE) 5 (4), 31-47, 2014 | 5 | 2014 |
Predicting attack prone software components using repository mined change metrics D Hein, H Saiedian International Conference on Information Systems Security and Privacy 2, 554-563, 2016 | 3 | 2016 |
A New Approach for Predicting Security Vulnerability Severity in Attack Prone Software Using Architecture and Repository Mined Change Metrics DD Hein University of Kansas, 2017 | 1 | 2017 |
Reasoning Qualitatively about Handheld Multimedia Framework Quality Attributes D Hein, H Saiedian Handbook of Research on Innovations in Systems and Software Engineering, 731-745, 2015 | | 2015 |
Ubiquitous Computing: A Taxonomy of Architectural Quality Attributes for Handheld Multimedia Devices D Hein, H Saiedian Handbook of Research on Mobile Software Engineering: Design, Implementation …, 2012 | | 2012 |