
Imano WilliamsNorth Carolina Agricultural and Technical State University | NC A&T · Department of Computer Science
Imano Williams
Master of Science
About
10
Publications
6,437
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
71
Citations
Publications
Publications (10)
Identifying security concerns is a security activity that can be integrated into the requirements development phase. However, it has been shown that manually identifying concerns is a time-consuming and challenging task. The software engineering community has utilized natural language processing and query systems to automatically find part of the r...
Nowadays, developers should incorporate software security best practices from the early stages of the software development lifecycle to build more robust software against software security attacks. However, incorporating security practices at the early stages of the SDLC is difficult for novice software developers that do not have a systematic appr...
Today, it is becoming the norm for software security best practices to be incorporated into all the software development life cycle (SDLC) stages. One main reason is that web applications relentlessly being susceptible to malicious cyber at attacks by cyber criminals. Software threat modeling is one of the best practices used in software security o...
Today, it is widely accepted that software security best practices need to be integrated into all the stages of the software development life cycle (SDLC). This is because software applications are constantly being exposed to malicious attacks by hackers. One of the best practices for software security is threat modeling. It is essential for softwa...
Developing abuse cases help software engineers to think from the perspective of attackers, and therefore allow them to decide and document how the software should react to illegitimate use. This paper describes a method for developing abuse cases based on threat modeling and attack patterns. First potential threats are analyzed by following Microso...
Questions
Question (1)
I have modeled a software artifact as a domain ontology using OWL. Next, I added instances for each class in the modeled domain. Next, I created predefined SPARQL queries for the domain ontology. I want to use the results of the software artifact predefined queries to search a relational DB of another domain.