Recent team publications:
Dynamic Reconfiguration: A Model for Cyber Subterfuge and Active Defense, Christian Johnson (University of Maryland and RSAC Security Scholar), Abstract and Poster, RSA Conference, San Francisco, CA (February 13-17, 2017). Also: Christian gave an interview while at RSA and described his experiences at the event.
A Comparison of Transfer Learning Algorithms for Defect and Vulnerability Detection, Ashton Webster (University of Maryland), CS Technical Report CS-TR-5053, (February 8, 2017).
The Effect of Dimensionality Reduction on Software Vulnerability Prediction Models, Jeffrey Stuckman (University of Maryland), James Walden (Northern Kentucky University) and Riccardo Scandariato (Chalmers University of Technology and the University of Gothenburg), IEEE Transactions on Reliability, (December 2016).
Democratizing Facial Recognition with Google Glass. J. Krach. University of Maryland Computer Science Department Technical Report CS-TR-5045 (September 14, 2015).
Assessing learning outcomes in a multidisciplinary program. J. Herrmann, K. King, P. Armstrong and J. Purtilo. Lilly International Spring Conference on Evidenced-based teaching and learning, Bethesda, MD (May 28-31, 2015).
Predicting Vulnerable Components: Software Metrics vs Text Mining. J. Walden, J. Stuckman and R. Scandariato. Proceedings of IEEE International Symposium on Software Reliability Engineering, Naples, Italy (November 2014). This work received the award for Best Research Paper at ISSRE. Congratulations to Jeff Stuckman and his co-authors.
Mining security vulnerabilities from Linux distribution metadata. J. Stuckman and J. Purtilo. Proceedings of 2nd IEEE International Workshop on Reliability and Security Data Analysis, Naples, Italy (November 2014).
Differences in quantitative assessment of myocardial scar and gray zone by LGE-CMR imaging using established gray zone protocols. O. Mesubi, K. Ego-Osuala, J. Jeudy, J. Purtilo, S. Synowski, A. Abutaleb, M. Niekoop, M. Abdulghani, R. Asoglu, V. See, A. Saliaris, S. Shorofsky, T. Dickfeld. The International Journal of Cardiovascular Imaging, DOI 10.1007/s10554-014-0555-0 (October 2014)
Evaluating software product metrics with synthetic defect data. J. Stuckman, K. Wills and J. Purtilo. Proceedings of 7th International Symposium on Empirical Software Engineering and Measurement, Baltimore, MD (October 10-11, 2013) Congratulations to Jeff Stuckman and Kent Wills for winning the award for Best Short Paper at this meeting.
BugBox: A vulnerability corpus for PHP web applications. G. Nilson, K. Wills, J. Stuckman and J. Purtilo. Proceedings of 6th USENIX Workshop on Cyber Security Experimentation and Test, Washington, DC, (August 12, 2013)
Baloo: Personal informatics for decision making. E. K. Smith and J. Purtilo. Proceedings of CHI 2013 Workshop on Personal Informatics in the Wild, Paris, France, (April 27-28, 2013)
Identification of Conducting Channels by Delayed Enhanced Cardiac Magnetic Resonance Imaging. O. Mesubi, M. Jeudy K. Ego-Osuala, Purtilo J, et al. Proceedings of the 2012 American Heart Association Conference, Los Angeles (November 2012)
Comparing and applying attack surface metrics. J. Stuckman and J. Purtilo. Proceedings of 4th International Workshop on Security Measurements and Metrics, Lund, Sweden (September 2012)
A testbed for the evaluation of web intrusion prevention systems. J. Stuckman and J. Purtilo. Proceedings of 3rd International Workshop on Security Measurements and Metrics, Banff, CA (September 2011)
Analyzing the Wikisphere: Methodology and Data to Support Quantitative Wiki Research. J. Stuckman and J. Purtilo. Journal of the American Society for Information Science and Technology, vol. 62, pp. 1564-1576, (August 2011)