Small memory software: patterns for systems with limited memory J Noble, C Weir Addison-Wesley Longman Publishing Co., Inc., 2001 | 146 | 2001 |
Small memory software: patterns for systems with limited memory J Noble, C Weir Addison-Wesley Longman Publishing Co., Inc., 2001 | 146 | 2001 |
A stitch in time: Supporting android developers in writingsecure code DC Nguyen, D Wermke, Y Acar, M Backes, C Weir, S Fahl Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 61 | 2017 |
Organizing pointers to objects in an array to improve the speed of object retrieval C Weir, T Wildenflycht US Patent 7,890,492, 2011 | 55 | 2011 |
Developers need support, too: A survey of security advice for software developers Y Acar, C Stransky, D Wermke, C Weir, ML Mazurek, S Fahl 2017 IEEE Cybersecurity Development (SecDev), 22-26, 2017 | 52 | 2017 |
I'd Like to Have an Argument, Please: Using Dialectic for Effective App Security C Weir, A Rashid, J Noble Internet Society, 2017 | 15 | 2017 |
Patterns for designing in teams C Weir Pattern Languages of Program Design 3, 487-501, 1998 | 15 | 1998 |
Reaching the masses: A new subdiscipline of app programmer education C Weir, A Rashid, J Noble Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 12 | 2016 |
How to improve the security skills of mobile app developers? Comparing and contrasting expert views C Weir, A Rashid, J Noble Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 2016 | 12 | 2016 |
A window in your pocket: Some small patterns for user interfaces C Weir, J Noble In Proc. European Pattern Languages of Programs. The Hillside Group, Inc, 2001 | 9 | 2001 |
A window in your pocket: Some small patterns for user interfaces C Weir, J Noble In Proc. European Pattern Languages of Programs. The Hillside Group, Inc, 2001 | 9 | 2001 |
Architectural Styles for Distribution Using Macro-Patterns for System Design C Weir in Frank Buschmann, Dirk Riehle (Eds.): Proceedings of the 1997 European …, 1997 | 7 | 1997 |
Patterns for managing limited memory J Noble, C Weir Proceedings of the Memory Preservation Society, 1-32, 1998 | 6 | 1998 |
Interventions for software security: creating a lightweight program of assurance techniques for developers C Weir, I Becker, J Noble, L Blair, A Sasse, A Rashid 2019 IEEE/ACM 41st International Conference on Software Engineering …, 2019 | 5 | 2019 |
Light-touch Interventions to Improve Software Development Security C Weir, L Blair, I Becker, A Sasse, J Noble 2018 IEEE Cybersecurity Development (SecDev), 85-93, 2018 | 5 | 2018 |
Process Patterns for Personal Practice. C Weir, J Noble EuroPLoP, 413-424, 1999 | 5 | 1999 |
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security C Weir, B Hermann, S Fahl 29th {USENIX} Security Symposium ({USENIX} Security 20), 2020 | 4 | 2020 |
Developer Essentials: Top Five Interventions to Support Secure Software Development C Weir, A Rashid, J Noble Lancaster University, 2017 | 3 | 2017 |
Early Report: How to Improve Programmers' Expertise at App Security? C Weir, A Rashid, J Noble CEUR-WS. org 1575, 49-50, 2016 | 2 | 2016 |
内存受限系统之软件开发: 针对内存受限系统而整理的模式 诺布尔, 韦尔, 捷, 侯, 飞, 软件开发 华中科技大学出版社, 2003 | 2 | 2003 |