Skip to main content

Research

My current research explores tools and educational practices for helping novice developers connect data structure and algorithm theory with software engineering practice. In addition, prior research work has focused on tools and practices for proactively building security into software from the beginning of the development lifecycle.

Publications

Journal Articles

  • J. King, J. Stallings, M. Riaz, and L. Williams, “To log, or not to log: using heuristics to identify mandatory log events – a controlled experiment,” Empirical Software Engineering, vol. 22, no. 5, pp. 2684–2717, Oct. 2017.
  • M. Riaz et al., “Identifying the implied: Findings from three differentiated replications on the use of security requirements templates,” Empirical Software Engineering, vol. 22, no. 4, pp. 2127–2178, Aug. 2017.
  • J. King, B. Smith, and L. Williams, “Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse,” vol. 3, no. 2, pp. 23–42, 2012.

Conference Articles

  • J. King, “Combining Theory and Practice in Data Structures & Algorithms Course Projects: An Experience Report,” in Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, New York, NY, USA, 2021, pp. 959–965.
  • S. Heckman and J. King, “Developing Software Engineering Skills using Real Tools for Automated Grading,” in Proceedings of the 49th ACM Technical Symposium on Computer Science Education, New York, NY, USA, 2018.
  • S. Heckman and J. King, “Teaching Software Engineering Skills in CS1.5: Incorporating Real-world Practices and Tools (Abstract Only),” in Proceedings of the 47th ACM Technical Symposium on Computing Science Education, New York, NY, USA, 2016, pp. 696–697.
  • J. C. Carver et al., “Establishing a Baseline for Measuring Advancement in the Science of Security: An Analysis of the 2015 IEEE Security & Privacy Proceedings,” in Proceedings of the Symposium and Bootcamp on the Science of Security, New York, NY, USA, 2016, pp. 38–51.
  • S. Heckman, J. King, and M. Winters, “Automating Software Engineering Best Practices Using an Open Source Continuous Integration Framework (Abstract Only),” in Proceedings of the 46th ACM Technical Symposium on Computer Science Education, New York, NY, USA, 2015, pp. 677–677.
  • J. King, R. Pandita, and L. Williams, “Enabling Forensics by Proposing Heuristics to Identify Mandatory Log Events,” in Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, New York, NY, USA, 2015, pp. 6:1–6:11.
  • J. King and L. Williams, “Log Your CRUD: Design Principles for Software Logging Mechanisms,” in Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, New York, NY, USA, 2014, pp. 5:1–5:10.
  • M. Riaz, J. Slankas, J. King, and L. Williams, “Using Templates to Elicit Implied Security Requirements from Functional Requirements – a Controlled Experiment,” in Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, New York, NY, USA, 2014, pp. 22:1–22:10.
  • M. Riaz, J. King, J. Slankas, and L. Williams, “Hidden in plain sight: Automatically identifying security requirements from natural language artifacts,” in 2014 IEEE 22nd International Requirements Engineering Conference (RE), 2014, pp. 183–192.
  • J. King, “Measuring the Forensic-ability of Audit Logs for Nonrepudiation,” in Proceedings of the 2013 International Conference on Software Engineering, Piscataway, NJ, USA, 2013, pp. 1419–1422.
  • J. King and L. Williams, “Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems,” in Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, Berkeley, CA, USA, 2013, pp. 4–4.
  • J. King and L. Williams, “Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry,” in Presented as part of the 3rd USENIX Workshop on Health Security and Privacy, Bellevue, WA, 2012.
  • J. King, B. Smith, and L. Williams, “Modifying Without a Trace: General Audit Guidelines Are Inadequate for Open-source Electronic Health Record Audit Mechanisms,” in Proceedings of the 2Nd ACM SIGHIT International Health Informatics Symposium, New York, NY, USA, 2012, pp. 305–314.
  • B. Smith et al., “Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected,” in Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, New York, NY, USA, 2010, pp. 1–12.

Technical Reports

  • A. Bosu et al., “Security Literature Review Paper Analysis Rubric,” Technical Report #SERG-2015-01, 2015.