Test-driven development: Concepts, taxonomy, and future direction DS Janzen, H Saiedian Computer 38 (9), 77-84, 2005 | 501 | 2005 |
What we have learned about fighting defects H Shull, F. and Basili, V. and Boehm, B. and Brown, A.W. and Costa, P. and ... Eighth IEEE Symposium on Software Metrics, 249-258, 2002 | 389 | 2002 |
Requirements engineering: making the connection between the software developer and customer H Saiedian, R Dale Information and software technology 42 (6), 419-428, 2000 | 310 | 2000 |
An invitation to formal methods H Saiedian Computer 29 (4), 16-30, 1996 | 215 | 1996 |
Does test-driven development really improve software design quality? D Janzen, H Saiedian Ieee Software 25 (2), 77-84, 2008 | 177 | 2008 |
Why software requirements traceability remains a challenge A Kannenberg, H Saiedian CrossTalk The Journal of Defense Software Engineering, 2009 | 158 | 2009 |
SEI capability maturity model's impact on contractors H Saiedian, R Kuzara Computer 28 (1), 16-26, 1995 | 158 | 1995 |
On the influence of test-driven development on software design DS Janzen, H Saiedian 19th Conference on Software Engineering Education & Training (CSEET'06), 141-148, 2006 | 134 | 2006 |
Test-driven learning: intrinsic integration of testing into the CS/SE curriculum DS Janzen, H Saiedian ACM SIGCSE Bulletin 38 (1), 254-258, 2006 | 129 | 2006 |
Test-driven learning in early programming courses D Janzen, H Saiedian Proceedings of the 39th SIGCSE technical symposium on Computer science …, 2008 | 117 | 2008 |
A novel kill-chain framework for remote security log analysis with SIEM software BD Bryant, H Saiedian computers & security 67, 198-210, 2017 | 84 | 2017 |
Understanding and reducing web delays M Zari, H Saiedian, M Naeem Computer 34 (12), 30-37, 2001 | 73 | 2001 |
Characterizing a software process maturity model for small organizations H Saiedian, N Carr ACM SIGICE Bulletin 23 (1), 2-11, 1997 | 58 | 1997 |
A leveled examination of test-driven development acceptance DS Janzen, H Saiedian 29th International Conference on Software Engineering (ICSE'07), 719-722, 2007 | 57 | 2007 |
An efficient algorithm to compute the candidate keys of a relational database schema H Saiedian, T Spencer The Computer Journal 39 (2), 124-132, 1996 | 50 | 1996 |
Security vulnerabilities in the same-origin policy: Implications and alternatives H Saiedian, D Broyle Computer 44 (9), 29-36, 2011 | 43 | 2011 |
Improving SIEM alert metadata aggregation with a novel kill-chain based classification model BD Bryant, H Saiedian Computers & Security 94, 101817, 2020 | 41 | 2020 |
Security threats and mitigating risk for USB devices A Tetmeyer, H Saiedian IEEE Technology and Society Magazine 29 (4), 44-49, 2010 | 39 | 2010 |
Can you trust software capability evaluations? E O'Connell, H Saidian Computer 33 (2), 28-35, 2000 | 39 | 2000 |
Secure software engineering: Learning from the past to address future challenges D Hein, H Saiedian Information Security Journal: A Global Perspective 18 (1), 8-25, 2009 | 33 | 2009 |