James Walden: Publications

Conference Papers
  1. James Walden, Jeff Stuckman, and Riccardo Scandariato. Predicting Vulnerable Components: Software Metrics vs Text Mining. The 25th IEEE International Symposium on Software Reliability Engineering (ISSRE), Naples, Italy, November 3-6, 2014.
  2. Bojan Simic and James Walden. Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. International Symposium on Engineering Secure Software and System (ESSoS 13), Paris, France, Feb 27-Mar 1, 2013.
  3. Riccardo Scandariato and James Walden. Predicting vulnerable classes in an Android application. International Workshop on Security Measurements and Metrics 2012, September 21, 2012.
  4. Aram Hovsepyan, Riccardo Scandariato, Wouter Joosen, and James Walden, Software Vulnerability Prediction using Text Analysis Techniques. International Workshop on Security Measurements and Metrics 2012, September 21, 2012.
  5. Work In Progress - Does Maintenance First Improve Student's Understanding And Appreciation Of Clean Code And Documentation. Maureen Doyle, Brooke Buckley, Wei Hao and James Walden, 2011 Frontiers in Education Conference, Rapid City, South Dakota, October 12 - 15, 2011.
  6. An Empirical Study of the Evolution of PHP Web Application Security. Maureen Doyle and James Walden, 7th International Workshop on Security Measurements And Metrics, Banff, Canada, September 21, 2011.
  7. An Effective Log Mining Approach for Database Intrusion Detection. Yi Hu, Alina Campan, James Walden, Irina Vorobyeva and Justin Shelton, IEEE International Conference on Systems, Man, and Cybernetics, Istanbul, Turkey, October 10-13, 2010.
  8. Impact of Plugins on the Security of Web Applications. James Walden, Maureen Doyle, Robert Lenhof, John Murray, Andrew Plunkett, International Workshop on Security Measurements and Metrics 2010, September 15, 2010.
  9. The Great Chains of Computing: Informatics at Multiple Scales. Kevin Kirby, James Walden, Rudy Garns, Maureen Doyle, Fourth International Conference on the Foundations of Information Science, Beijing, China, August 21-24, 2010.
  10. Java vs. PHP: Security Implications of Language Choice for Web Applications. James Walden, Maureen Doyle, Robert Lenhof, John Murray, International Symposium on Engineering Secure Software and Systems (ESSoS), Pisa, Italy, February 2-3 2010.
  11. Security of Open Source Web Applications. James Walden, Maureen Doyle, Grant Welch, Michael Whelan, International Workshop on Security Measurements and Metrics 2009, October 14 2009.
  12. Measuring the Effect of Code Complexity on Static Analysis. James Walden, Adam Messer, and Alex Kuhl, International Symposium on Engineering Secure Software and Systems (ESSoS), Leuven, Belgium, February 4-6, 2009.
  13. OWASP Source Code Review. OWASP EU Summit 2008, Algarve, Portugal, November 4-7, 2008.
  14. Integrating Web Application Security into the IT Curriculum. James Walden, Proceedings of the 9th ACM SIGITE Technical Symposium on Information Technology Education, October 14-16, 2008.
  15. Secure Software Engineering Teaching Modules. James Walden and Charles Frank, Proceedings of the 2006 Information Security Curriculum Development Conference, September 22-23, 2006.
  16. Teaching the Secure Development Lifecycle: Challenges and Experiences. Rose Shumba, James Walden, Stephanie Ludi, Carol Taylor, Andy Ju An Wang, Proceedings of the 10th Annual Colloquium for Information Systems Security Education (CISSE), June 2006.
  17. Integrating Secure Development Practices into the Software Engineering Curriculum. James Walden and Rose Shumba, 2006 American Society for Engineering Education (ASEE) Annual Conference, June 2006.
  18. Computer Security Education: Past, Present and Future. Carol Taylor, Rose Shumba, and James Walden, Proceedings of the Seventh Workshop on Education in Computer Security (WECS7), January 2006.
  19. A Real-Time Information Warfare Exercise on a Virtual Network. James Walden, Proceedings of the 36th ACM SIGCSE Technical Symposium on Computer Science Education, February 2005.
Journal Publications
  1. Riccardo Scandariato, James Walden, Aram Hovsepyan, and Wouter Joosen. Predicting Vulnerable Software Components via Text Mining. To appear in IEEE Transactions on Software Engineering.
  2. Yi Hu, Charles Frank, James Walden, Emily Crawford, Dhanuja Kasturiratna. Mining File Repository Accesses for Detecting Data Exfiltration Activities. Journal of Artificial Intelligence and Soft Computing Research.
  3. James Walden and Maureen Doyle, SAVI: Static-Analysis Vulnerability Indicator. IEEE Security & Privacy, vol.10, no.3, pp.32-39, May-June 2012.
  4. SU(3) Breaking in Neutral Current Axial Matrix Elements and the Spin Content of the Nucleon. Martin J. Savage and James Walden, Phys. Rev. D55 (1997) 5376-5384
  5. Large N_C Relations Among Isgur Wise Functions. David E. Brahm and James Walden, Mod. Phys. Lett. A12 (1997) 357-362
  6. The Radiative Charmed Baryon Decay \Xi^{0*}_{c2} \rightarrow \Xi^{0}_{c1} \gamma. Ming Lu, Martin J. Savage, and James Walden, Phys. Lett. B369 (1996) 337-340
  7. Final State Interactions and CP Violation in K_L \rightarrow \pi^+ \pi^- e^+ e^-. John K. Elwood, Mark B. Wise, Martin J. Savage, and James W. Walden, Phys. Rev. D53 (1996) 4078-4081
  8. Laser with Injected Squeezing. P.R. Rice, X.Yin, J.Walden, J.Gea-Manacle, and L.M.Pedrotti, Phys. Rev. A50 (1994), 4176
Peer-Reviewed Presentations
  1. Code Complexity and Static Analysis. James Walden and Adam Messer, Metricon 3.0, July 29, 2008.
  2. Web Application Security Exercise Development Approaches. Faculty Workshop on Secure Software Development, April 14-15, 2008.
  3. Injection Attacks. Ohio Information Security Conference, March 18, 2008.
  4. Software Security. Ohio Information Security Conference, March 14, 2007.

© 2005-2020 James Walden, Ph.D.