Imano Williams

Imano Williams
North Carolina Agricultural and Technical State University | NC A&T · Department of Computer Science

Master of Science

About

10
Publications
6,437
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
71
Citations
Additional affiliations
August 2014 - December 2015
North Carolina Agricultural and Technical State University
Position
  • Research Assistant, Teaching Assistant

Publications

Publications (10)
Article
Full-text available
Identifying security concerns is a security activity that can be integrated into the requirements development phase. However, it has been shown that manually identifying concerns is a time-consuming and challenging task. The software engineering community has utilized natural language processing and query systems to automatically find part of the r...
Chapter
Nowadays, developers should incorporate software security best practices from the early stages of the software development lifecycle to build more robust software against software security attacks. However, incorporating security practices at the early stages of the SDLC is difficult for novice software developers that do not have a systematic appr...
Article
Today, it is becoming the norm for software security best practices to be incorporated into all the software development life cycle (SDLC) stages. One main reason is that web applications relentlessly being susceptible to malicious cyber at attacks by cyber criminals. Software threat modeling is one of the best practices used in software security o...
Conference Paper
Today, it is widely accepted that software security best practices need to be integrated into all the stages of the software development life cycle (SDLC). This is because software applications are constantly being exposed to malicious attacks by hackers. One of the best practices for software security is threat modeling. It is essential for softwa...
Article
Full-text available
Developing abuse cases help software engineers to think from the perspective of attackers, and therefore allow them to decide and document how the software should react to illegitimate use. This paper describes a method for developing abuse cases based on threat modeling and attack patterns. First potential threats are analyzed by following Microso...

Questions

Question (1)
Question
I have modeled a software artifact as a domain ontology using OWL. Next, I added instances for each class in the modeled domain. Next, I created predefined SPARQL queries for the domain ontology. I want to use the results of the software artifact predefined queries to search a relational DB of another domain.

Network

Cited By