Follow
Diane Corney
Diane Corney
Oracle Labs Australia
Verified email at oracle.com - Homepage
Title
Cited by
Cited by
Year
Security metrics for object-oriented class designs
B Alshammari, C Fidge, D Corney
2009 Ninth International Conference on Quality Software, 11-20, 2009
902009
Security metrics for object-oriented designs
B Alshammari, C Fidge, D Corney
2010 21st Australian Software Engineering Conference, 55-64, 2010
532010
Assessing the impact of refactoring on security-critical object-oriented designs
B Alshammari, C Fidge, D Corney
2010 Asia Pacific Software Engineering Conference, 186-195, 2010
282010
Evaluating the Java virtual machine as a target for languages other than Java
KJ Gough, D Corney
Modular Programming Languages: Joint Modular Languages Conference, JMLC 2000 …, 2000
262000
A hierarchical security assessment model for object-oriented programs
B Alshammari, C Fidge, D Corney
2011 11th International Conference on Quality Software, 218-227, 2011
162011
Type test elimination using typeflow analysis
D Corney, J Gough
Programming Languages and System Architectures: International Conference …, 2005
132005
Security assessment of code refactoring rules
B Alshammari, C Fidge, D Corney
WIAR 2012; National Workshop on Information Assurance Research, 1-10, 2012
112012
An experiment in mixed compilation/interpretation
J Gough, C Cifuentes, D Corney, JR Hynd, P Kolb
14th Australian Computer Science Conference, 1992
111992
Developing secure systems: a comparative study of existing methodologies
B Alshammari, C Fidge, D Corney
Lecture Notes on Software Engineering 4 (2), 139-146, 2016
62016
An automated tool for assessing security-critical designs and programs
B Alshammari, C Fidge, D Corney
WIAR 2012; National Workshop on Information Assurance Research, 1-10, 2012
62012
Automatic generation of assertions to detect potential security vulnerabilities in C programs that use union and pointer types
SKA Khalid, J Zimmermann, D Corney, C Fidge
2010 Fourth International Conference on Network and System Security, 351-356, 2010
62010
Scalable static analysis to detect security vulnerabilities: Challenges and solutions
F Gauthier, N Keynes, N Allen, D Corney, P Krishnan
2018 IEEE Cybersecurity Development (SecDev), 134-134, 2018
52018
Security metrics for java bytecode programs
B Alshammari, C Fidge, D Corney
Proceedings of the Twenty-Fifth International Conference on Software …, 2013
42013
Reading and Writing PE-files with PERWAPI
J Gough, D Corney
42010
An adaptable framework for the teaching and assessment of software development across year levels
RN Thomas, M Cordiner, D Corney
The 12th Australasian Computing Education Conference, 2010
42010
Implementing languages other than java on the java virtual machine
K Gough, D Corney
Proceedings of Evolve 2000, 2000
42000
Tool-supported data flow analysis of a security-critical embedded device
C Mills, C Fidge, D Corney
Information Security 2012-Proceedings of the Tenth Australasian Information …, 2012
32012
Data flow analysis of embedded program expressions
C Doble, C Fidge, D Corney
Information Security 2012-Proceedings of the Tenth Australasian Information …, 2012
22012
Integrating hardware and software information flow analyses
CJ Fidge, D Corney
ACM Sigplan Notices 44 (7), 157-166, 2009
22009
Leveraging managed frameworks from modular languages
KJ Gough, D Corney
Modular Programming Languages: Joint Modular Languages Conference, JMLC 2003 …, 2003
12003
The system can't perform the operation now. Try again later.
Articles 1–20