Security metrics for object-oriented class designs B Alshammari, C Fidge, D Corney 2009 Ninth International Conference on Quality Software, 11-20, 2009 | 90 | 2009 |
Security metrics for object-oriented designs B Alshammari, C Fidge, D Corney 2010 21st Australian Software Engineering Conference, 55-64, 2010 | 53 | 2010 |
Assessing the impact of refactoring on security-critical object-oriented designs B Alshammari, C Fidge, D Corney 2010 Asia Pacific Software Engineering Conference, 186-195, 2010 | 28 | 2010 |
Evaluating the Java virtual machine as a target for languages other than Java KJ Gough, D Corney Modular Programming Languages: Joint Modular Languages Conference, JMLC 2000 …, 2000 | 26 | 2000 |
A hierarchical security assessment model for object-oriented programs B Alshammari, C Fidge, D Corney 2011 11th International Conference on Quality Software, 218-227, 2011 | 16 | 2011 |
Type test elimination using typeflow analysis D Corney, J Gough Programming Languages and System Architectures: International Conference …, 2005 | 13 | 2005 |
Security assessment of code refactoring rules B Alshammari, C Fidge, D Corney WIAR 2012; National Workshop on Information Assurance Research, 1-10, 2012 | 11 | 2012 |
An experiment in mixed compilation/interpretation J Gough, C Cifuentes, D Corney, JR Hynd, P Kolb 14th Australian Computer Science Conference, 1992 | 11 | 1992 |
Developing secure systems: a comparative study of existing methodologies B Alshammari, C Fidge, D Corney Lecture Notes on Software Engineering 4 (2), 139-146, 2016 | 6 | 2016 |
An automated tool for assessing security-critical designs and programs B Alshammari, C Fidge, D Corney WIAR 2012; National Workshop on Information Assurance Research, 1-10, 2012 | 6 | 2012 |
Automatic generation of assertions to detect potential security vulnerabilities in C programs that use union and pointer types SKA Khalid, J Zimmermann, D Corney, C Fidge 2010 Fourth International Conference on Network and System Security, 351-356, 2010 | 6 | 2010 |
Scalable static analysis to detect security vulnerabilities: Challenges and solutions F Gauthier, N Keynes, N Allen, D Corney, P Krishnan 2018 IEEE Cybersecurity Development (SecDev), 134-134, 2018 | 5 | 2018 |
Security metrics for java bytecode programs B Alshammari, C Fidge, D Corney Proceedings of the Twenty-Fifth International Conference on Software …, 2013 | 4 | 2013 |
Reading and Writing PE-files with PERWAPI J Gough, D Corney | 4 | 2010 |
An adaptable framework for the teaching and assessment of software development across year levels RN Thomas, M Cordiner, D Corney The 12th Australasian Computing Education Conference, 2010 | 4 | 2010 |
Implementing languages other than java on the java virtual machine K Gough, D Corney Proceedings of Evolve 2000, 2000 | 4 | 2000 |
Tool-supported data flow analysis of a security-critical embedded device C Mills, C Fidge, D Corney Information Security 2012-Proceedings of the Tenth Australasian Information …, 2012 | 3 | 2012 |
Data flow analysis of embedded program expressions C Doble, C Fidge, D Corney Information Security 2012-Proceedings of the Tenth Australasian Information …, 2012 | 2 | 2012 |
Integrating hardware and software information flow analyses CJ Fidge, D Corney ACM Sigplan Notices 44 (7), 157-166, 2009 | 2 | 2009 |
Leveraging managed frameworks from modular languages KJ Gough, D Corney Modular Programming Languages: Joint Modular Languages Conference, JMLC 2003 …, 2003 | 1 | 2003 |