Ben Smith
Ben Smith
Blockchain Solutions Developer, IBM
Verified email at us.ibm.com - Homepage
Title
Cited by
Cited by
Year
Validating software metrics: A spectrum of philosophies
A Meneely, B Smith, L Williams
ACM Transactions on Software Engineering and Methodology (TOSEM) 21 (4), 1-28, 2013
1022013
An empirical evaluation of the MuJava mutation operators
BH Smith, L Williams
Testing: Academic and Industrial Conference Practice and Research Techniques …, 2007
782007
On guiding the augmentation of an automated test suite via mutation analysis
BH Smith, L Williams
Empirical software engineering 14 (3), 341-369, 2009
742009
Appendix B: iTrust electronic health care system case study
A Meneely, B Smith, L Williams
Software and Systems Traceability, 425, 2012
532012
Truckers drive their own assessment for obstructive sleep apnea: a collaborative approach to online self-assessment for obstructive sleep apnea
B Smith, BA Phillips
Journal of clinical sleep medicine 7 (3), 241-245, 2011
532011
Challenges for protecting the privacy of health information: required certification can leave common vulnerabilities undetected
B Smith, A Austin, M Brown, JT King, J Lankford, A Meneely, L Williams
Proceedings of the second annual workshop on Security and privacy in medical …, 2010
432010
Modifying without a trace: general audit guidelines are inadequate for open-source electronic health record audit mechanisms
JT King, B Smith, L Williams
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
422012
Should software testers use mutation analysis to augment a test set?
BH Smith, L Williams
Journal of Systems and Software 82 (11), 1819-1832, 2009
362009
Using SQL hotspots in a prioritization heuristic for detecting all types of web application vulnerabilities
B Smith, L Williams
2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011
332011
Assessing the accuracy of legal implementation readiness decisions
AK Massey, B Smith, PN Otto, AI Antón
2011 IEEE 19th International Requirements Engineering Conference, 207-216, 2011
272011
On the effective use of security test patterns
B Smith, L Williams
2012 IEEE Sixth International Conference on Software Security and …, 2012
262012
Towards improved security criteria for certification of electronic health record systems
A Austin, B Smith, L Williams
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care …, 2010
232010
A survey on code coverage as a stopping criterion for unit testing
B Smith, LA Williams
North Carolina State University. Dept. of Computer Science, 2008
212008
Idea: using system level testing for revealing SQL injection-related error message information leaks
B Smith, L Williams, A Austin
International Symposium on Engineering Secure Software and Systems, 192-200, 2010
192010
Software metrics validation criteria: A systematic literature review
A Meneely, B Smith, LA Williams
North Carolina State University. Dept. of Computer Science, 2010
132010
IBM Blockchain: An enterprise deployment of a distributed consensus-based transaction log
B Smith, K Christidis
Proc. Fourth International IBM Cloud Academy Conference 210, 2016
112016
Systematizing security test case planning using functional requirements phrases
B Smith
Proceedings of the 33rd International Conference on Software Engineering …, 2011
112011
Proposing SQL statement coverage metrics
B Smith, Y Shin, L Williams
Proceedings of the fourth international workshop on Software engineering for …, 2008
112008
Systematizing security test planning using functional requirements phrases
B Smith, LA Williams
North Carolina State University. Dept. of Computer Science, 2011
82011
Audit mechanisms in electronic health record systems: protected health information may remain vulnerable to undetected misuse
J King, B Smith, L Williams
International Journal of Computational Models and Algorithms in Medicine …, 2012
62012
The system can't perform the operation now. Try again later.
Articles 1–20