Papers
“Software security for open-source systems”, IEEE Security & Privacy Magazine, vol. 1, no. 1, pp. 38 - 45, 2003.
, “On the security of open source software”, Information systems journal, vol. 12, pp. 61–78, 2002. Payne2002_ISJ12_SecurityOSS.pdf (111.53 KB)
, “Does open source improve system security?”, IEEE Software, vol. 18, pp. 57–61, 2001. 01579ad1c373ed59a19eba0396f7f0cb7a0e.pdf (121.65 KB)
, “The Open Source approach—opportunities and limitations with respect to security and privacy”, Computers & Security, vol. 21, pp. 461–471, 2002. HaKP_02OpenSource_0214.doc (2.5 MB)
, “A Theory of Disclosure for Security and Competitive Reasons: Open Source, Proprietary Software, and Government Systems”, Hous. L. Rev., vol. 42, p. 1333, 2005. KP21 03 Swire.pdf (294.24 KB)
, “Security in open versus closed systems—the dance of Boltzmann, Coase and Moore”. Technical report, Cambridge University, England, 2002. toulouse.pdf (119.58 KB)
, “Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities”, AMCIS 2009 Proceedings, p. 387, 2009. Schryen_-_AMCIS_09_-_Security_of_open_source_and_closed_source_software_-_Web_version.pdf (442.07 KB)
, “Open and Closed Systems are Equivalent (that is, in an ideal world)”, in Perspectives on free and open source software, MIT Press, 2005, pp. 127-142. toulousebook.pdf (162.36 KB)
, “Towards a bayesian approach in modeling the disclosure of unique security faults in open source projects”, in Software Reliability Engineering (ISSRE), 2010 IEEE 21st International Symposium on, 2010, pp. 101–110. 0b13ae1e6317c7e31f6b8783f669b978ffb3.pdf (762.61 KB)
, “How Do Firms Make Use of Open Source Communities?”, Long Range Planning, vol. 41. pp. 629-649, 2008. dahlandermagnusson2008.pdf (49.96 KB)
, “The Material and Social Dynamics of Motivation: Contributions to Open Source Language Technology Development”, Science Studies, 2008. Freeman.pdf (147.13 KB)
, “MAPO: mining API usages from open source repositories”, in Proceedings of the 2006 international workshop on Mining software repositories, New York, NY, USA, 2006, pp. 54–57. 54MAPO.pdf (154.04 KB)
, “Analyzing and mining a code search engine usage log”, Empirical Software Engineering, vol. 17, no. 4-5, pp. 424 - 466, 2012.
, “Mining search topics from a code search engine usage log”, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 111 - 120.
, “Analyzing and mining a code search engine usage log”, Empirical Software Engineering, vol. 17, no. 4-5, pp. 424 - 466, 2012.
, “Bridging the Gap between Agile and Free Software Approaches”, International Journal of Open Source Software and Processes, vol. 1, no. 1, pp. 58 - 71, 2009.
, “The Agile Management of Development Projects of Software Combining Scrum, Kanban and Expert Consultation”, in Open Source Software: Mobile Open Source Technologies, vol. 427, Springer Berlin Heidelberg, 2014, pp. 176-180.
, “Economic incentives for participating in open source software projects”, The Twenty-Third International Conference on Information Systems. pp. 365–372, 2002. hann.pdf (176.85 KB)
, “Applying Social Network Analysis Techniques to Community-Driven Libre Software Projects”, International Journal of Information Technology and Web Engineering, vol. 1, 2006. 06_Lopez_ijitwe_sna.pdf (713.18 KB)
, “Two case studies of open source software development: Apache and Mozilla”, ACM Transactions on Software Engineering and Methodology, vol. 11, pp. 309-346, 2002. mockusFieldingHerbsleb2002.pdf (365.14 KB)
, “Clustering and Dependencies in Free/Open Source Software Development: Methodology and Tools”, 2003. cluster-final.pdf (252.09 KB)
, “A Case Study of Open Source Software Development: The Apache Server”, Proceedings of the International Conference on Software Engineering (ICSE 2000), 2000. mockusapache.pdf (252.28 KB)
, “The promises and perils of mining git”, in Proceedings of the 6th International Working Conference on Mining Software Repositories, MSR 2009, 2009, pp. 1-10. 1promisePeril.pdf (641.01 KB)
, “From work to word: How do software developers describe their work?”, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 121 - 130.
, “Assigning bug reports using a vocabulary-based expertise model of developers”, in 2009 6th IEEE International Working Conference on Mining Software Repositories (MSR)2009 6th IEEE International Working Conference on Mining Software Repositories, Vancouver, BC, Canada, 2009, pp. 131 - 140. 131AssigningBugReports.pdf (265.91 KB)
,