Follow
Hossein Saiedian, Ph.D.
Title
Cited by
Cited by
Year
Test-driven development: Concepts, taxonomy, and future direction
DS Janzen, H Saiedian
Computer 38 (9), 77-84, 2005
4402005
What we have learned about fighting defects
H Shull, F. and Basili, V. and Boehm, B. and Brown, A.W. and Costa, P. and ...
Eighth IEEE Symposium on Software Metrics, 249-258, 2002
3592002
Requirements engineering: making the connection between the software developer and customer
H Saiedian, R Dale
Information and software technology 42 (6), 419-428, 2000
2752000
An invitation to formal methods
H Saiedian
Computer 29 (4), 16-30, 1996
2111996
Does test-driven development really improve software design quality?
D Janzen, H Saiedian
Ieee Software 25 (2), 77-84, 2008
1582008
SEI capability maturity model's impact on contractors
H Saiedian, R Kuzara
Computer 28 (1), 16-26, 1995
1451995
Why software requirements traceability remains a challenge
A Kannenberg, H Saiedian
CrossTalk The Journal of Defense Software Engineering, 2009
1422009
On the influence of test-driven development on software design
DS Janzen, H Saiedian
19th Conference on Software Engineering Education & Training (CSEET'06), 141-148, 2006
1272006
Test-driven learning: intrinsic integration of testing into the CS/SE curriculum
DS Janzen, H Saiedian
ACM SIGCSE Bulletin 38 (1), 254-258, 2006
1142006
Test-driven learning in early programming courses
D Janzen, H Saiedian
Proceedings of the 39th SIGCSE technical symposium on Computer science …, 2008
1052008
Understanding and reducing web delays
M Zari, H Saiedian, M Naeem
Computer 34 (12), 30-37, 2001
742001
Characterizing a software process maturity model for small organizations
H Saiedian, N Carr
ACM SIGICE Bulletin 23 (1), 2-11, 1997
601997
A leveled examination of test-driven development acceptance
DS Janzen, H Saiedian
29th International Conference on Software Engineering (ICSE'07), 719-722, 2007
542007
A novel kill-chain framework for remote security log analysis with SIEM software
BD Bryant, H Saiedian
computers & security 67, 198-210, 2017
522017
An efficient algorithm to compute the candidate keys of a relational database schema
H Saiedian, T Spencer
The Computer Journal 39 (2), 124-132, 1996
471996
Security vulnerabilities in the same-origin policy: Implications and alternatives
H Saiedian, D Broyle
Computer 44 (9), 29-36, 2011
342011
Security threats and mitigating risk for USB devices
A Tetmeyer, H Saiedian
IEEE Technology and Society Magazine 29 (4), 44-49, 2010
342010
Can you trust software capability evaluations?
E O'Connell, H Saidian
Computer 33 (2), 28-35, 2000
342000
Software engineering programs: dispelling the myths and misconceptions
H Saiedian, DJ Bagert, NR Mead
IEEE software 19 (5), 35-41, 2002
292002
An evaluation of the impact of component-based architectures on software reusability
K McArthur, H Saiedian, M Zand
Information and Software Technology 44 (6), 351-359, 2002
292002
The system can't perform the operation now. Try again later.
Articles 1–20