-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
391 lines (388 loc) · 31.7 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<title>Ben Smith</title>
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/jquery.min.js" integrity="sha512-v2CJ7UaYy4JwqLDIrZUI/4hqeoQieOmAZNXBeQyjo21dadnwR+8ZaIJVT8EE2iyI61OV8e6M8PP2/4hpQINQ/g==" crossorigin="anonymous" referrerpolicy="no-referrer"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/popper.js/2.11.8/umd/popper.min.js" integrity="sha512-TPh2Oxlg1zp+kz3nFA0C5vVC6leG/6mm1z9+mA81MI5eaUVqasPLO8Cuk4gMF4gUfP5etR73rgU/8PNMsSesoQ==" crossorigin="anonymous" referrerpolicy="no-referrer"></script>
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/bootstrap/5.3.3/css/bootstrap.min.css" integrity="sha512-jnSuA4Ss2PkkikSOLtYs8BlYIeeIK1h99ty4YfvRPAlzr377vr3CXDb7sb7eEEBYjDtcYj+AjBH3FLv5uSJuXg==" crossorigin="anonymous" referrerpolicy="no-referrer" />
<script src="https://cdnjs.cloudflare.com/ajax/libs/font-awesome/6.5.2/js/all.min.js" integrity="sha512-u3fPA7V8qQmhBPNT5quvaXVa1mnnLSXUep5PS1qo5NRzHwG19aHmNJnj1Q8hpA/nBWZtZD4r4AX6YOt5ynLN2g==" crossorigin="anonymous" referrerpolicy="no-referrer"></script>
<script src="https://cdnjs.cloudflare.com/ajax/libs/bootstrap-table/1.22.4/bootstrap-table.min.js" integrity="sha512-8kS4yn/O1eS/Dq7nHWS4erjqdUnTtyQgFmRExjx6Qu0NtGbOlbp2uO4Tj/ebTKj/fVf/uWyLHvMgNPg+tsnpbw==" crossorigin="anonymous" referrerpolicy="no-referrer"></script>
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/bootstrap-table/1.22.4/bootstrap-table.min.css" integrity="sha512-7baiIRsWC9O5cLDaPKElCgAWUFNlYBAYhtJWOuHvKFagRu93EjjszpxmHtYmNB6hwarYrk8ztwgn/rK6D1bPLQ==" crossorigin="anonymous" referrerpolicy="no-referrer" />
<script src="https://cdnjs.cloudflare.com/ajax/libs/bootstrap-table/1.22.4/locale/bootstrap-table-en-US.min.js" integrity="sha512-zJGQ4KoYBTDy+paWTZ/JpqmcexuTEwilyyVLBJ+CISsxibAvzy2sFHS6lOEmSbj8hJl4nBubnESfa2GHeBfX4g==" crossorigin="anonymous" referrerpolicy="no-referrer"></script>
</head>
<body>
<div class="container-fluid">
<div class="row">
<div class="sidebar border border-right col-md-3 col-lg-2 p-3 bg-body-tertiary">
<img src="https://s3.amazonaws.com/bensmith/website/img/mugshot.png" class="mw-100 img-responsive" alt="A picture of Ben Smith" />
<div class="btn-group-vertical w-100 mt-2" role="group" aria-label="Vertical button group">
<a class="btn btn-outline-primary icon-link link-success" href="https://twitter.com/bensmithibm" target="_blank"><i class="fab fa-twitter"></i>Twitter</a></li>
<a class="btn btn-outline-primary icon-link link-success" href="https://facebook.com/programsam" target="_blank"><i class="fab fa-facebook"></i>Facebook</a></li>
<a class="btn btn-outline-primary icon-link link-success" href="http://www.linkedin.com/in/benjaminhsmith" target="_blank"><i class="fab fa-linkedin"></i>LinkedIn</a></li>
<a class="btn btn-outline-primary icon-link link-success" href="http://github.com/benjsmi" target="_blank"><i class="fab fa-github"></i>IBM GitHub</a></li>
<a class="btn btn-outline-primary icon-link link-success" href="http://github.com/programsam" target="_blank"><i class="fab fa-github-alt"></i>Personal GitHub</a></li>
<a class="btn btn-outline-primary icon-link link-success" href="http://bensmith.s3.amazonaws.com/website/cv.pdf" target="_blank"><i class="fas fa-file-pdf"></i>Resume</a></li>
</div>
</div>
<main class="col-md-9 ms-sm-auto col-lg-10 p-3">
<ul class="nav nav-tabs" id="myTab" role="tablist">
<li class="nav-item" role="presentation">
<button class="nav-link active" id="home-tab" data-bs-toggle="tab" data-bs-target="#home-tab-pane" type="button" role="tab" aria-controls="home-tab-pane" aria-selected="true">About Ben</button>
</li>
<li class="nav-item" role="presentation">
<button class="nav-link" id="pubs-tab" data-bs-toggle="tab" data-bs-target="#pubs-tab-pane" type="button" role="tab" aria-controls="pubs-tab-pane" aria-selected="false">Publications</button>
</li>
<li class="nav-item" role="presentation">
<button class="nav-link" id="creds-tab" data-bs-toggle="tab" data-bs-target="#creds-tab-pane" type="button" role="tab" aria-controls="creds-tab-pane" aria-selected="false">Badges</button>
</li>
<li class="nav-item" role="presentation">
<button class="nav-link" id="other-tab" data-bs-toggle="tab" data-bs-target="#other-tab-pane" type="button" role="tab" aria-controls="other-tab-pane" aria-selected="false">Other</button>
</li>
</ul>
<div class="tab-content p-3" id="myTabContent">
<div class="tab-pane fade show active" id="home-tab-pane" role="tabpanel" aria-labelledby="home-tab" tabindex="0">
<h1>Benjamin Hatfield Smith, PhD</h1>
<p>Ben Smith is the security and compliance focal for <a target="_blank" class="link-success" href="http://www.ibm.com/blockchain/">IBM's Support for Hyperledger Fabric Offering</a>, IBM's commercially provided version of <a target="_blank" class="link-success" href="https://www.hyperledger.org/projects/fabric">the open source Hyperledger Fabric Blockchain</a>. Ben joined IBM in 2012, and works at IBM's Research Triangle Park location in North Carolina. Ben started work at IBM with <a target="_blank" class="link-success" href="https://ibm.com/cloud">IBM Cloud</a>, IBM's platform for infrastructure, platform, and software services in cloud. Ben helped stand up the initial instance of IBM's Cloud, at that time called Bluemix, and worked with the WebSphere team to integrate <a target="_blank" class="link-success" href="https://openliberty.io">WebSphere Liberty</a> into IBM Cloud through developing and contributing to the <a target="_blank" class="link-success" href="https://github.com/cloudfoundry/ibm-websphere-liberty-buildpack">IBM WebSphere Liberty Buildpack</a>, the tool that helps WebSphere users run their apps in <a class="link-success" href="https://www.cloudfoundry.org/">Cloud Foundry</a> environments. </p>
<p>Ben is a recipient of the <a target="_blank" class="link-success" href="http://www.research.ibm.com/university/phdfellowship/index.shtml">IBM PhD Fellowship</a> for <a target="_blank" class="link-success" href="https://www.csc.ncsu.edu/news/1149">2010 and 2011</a>. He received his <a href="https://www.csc.ncsu.edu/academics/undergrad/bs-csc.php" target="_blank" class="link-success">Bachelor's in Computer Science</a> in May of 2007, and received his <a href="https://www.csc.ncsu.edu/academics/graduate/degrees/ms.php" class="link-success" target="_blank">Master's of Science in Computer Science</a> in May of 2009. He received his <a href="https://www.csc.ncsu.edu/academics/graduate/degrees/phd.php" target="_blank" class="link-success">Doctorate in Computer Science</a> in 2012, advised by <a target="_blank" class="link-success" href="http://collaboration.csc.ncsu.edu/laurie/" >Dr. Laurie Williams</a> at <a class="link-success" href="http://ncsu.edu">North Carolina State University</a>. </p>
<p>Ben is also a musician, and has been playing piano since high school. He experiments with home recording and is working on writing an album. Some of his music can be found on <a class="link-success" target="_blank" href="https://maestrogato.bandcamp.com/">bandcamp</a>. Ben enjoys hiking and experimenting with <a target="_blank" class="link-success" href="https://www.raspberrypi.org/">Raspberry Pi</a> in his free time.</p>
</div>
<div class="tab-pane fade" id="pubs-tab-pane" role="tabpanel" aria-labelledby="pubs-tab" tabindex="0">
<h1>Ben's Publications</h1>
<table
data-toggle="table"
data-pagination="true"
data-striped="true"
data-search="true"
data-buttons="buttons"
data-page-size="5"
data-page-list="[3,5,10,20,All]"
data-show-toggle="true"
data-icons-prefix="fa"
data-show-columns="true"
data-show-pagination-switch="true"
>
<thead>
<tr>
<th>Type</th>
<th>Citation</th>
<th>Access</th>
</thead>
<tbody>
<tr>
<td>Book Chapter</td>
<td>A. Meneely, B. Smith, L. Williams, "iTrust Electronic Health Care System: A Case Study" in <em>Software Systems and Traceability</em>. J. Cleland-Huang, O. Gotel, A. Zisman, <em>eds</em>. Springer, pp. 425-438, 2012.</td>
<td><a href="https://doi.org/10.1007/978-1-4471-2239-5" target="_blank">
<i class="fas fa-book fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/sst2011.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Journal</td>
<td>A. Meneely, B. Smith, and L. Williams, "Software Metrics Validation Criteria: A Systematic Literature Review." Transactions on Software Engineering and Methodology, vol. 21, no. 4, 2012.</td>
<td><a href="http://dx.doi.org/10.1145/2377656.2377661" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/tosem_metrics.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Journal</td>
<td>B. Smith and B. Phillips, "Truckers Drive Their Own Assessment for Obstructive Sleep Apnea: A Collaborative Approach to Online Self-Assessment for Obstructive Sleep Apnea", Journal of Clinical Sleep Medicine, vol. 7, no. 3, pp. 241-245, 2011.</td>
<td><a href="https://dx.doi.org/10.5664/JCSM.1060" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/jcsm2011.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Journal</td>
<td>B. Smith and L. Williams, "On Guiding the Augmentation of an Automated Test Suite via Mutation Analysis", Empirical Software Engineering, vol. 14, no. 3, pp. 341-369, 2009.</td>
<td><a href="http://dx.doi.org/10.1007/s10664-008-9083-7" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/emse_mutation.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Journal</td>
<td>B.H. Smith and L. Williams, "Should Software Testers use Mutation Analysis to Augment a Test Set?", Journal of Systems Software, vol. 82, no. 11, pp. 1819-1832, 2009.</td>
<td><a href="http://dx.doi.org/10.1016/j.jss.2009.06.031" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/jss_mutation.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Conference</td>
<td>B. Smith, K. Christidis, "IBM Blockchain: An Enterprise Deployment of a Distributed Consensus-based Transaction Log", Fourth International IBM Cloud Academy Conference (ICA2016), Alberta, Canada, pp. 140-143, 2016.</td>
<td><a href="https://www.ibm.com/solutions/education/cloudacademy/us/en/cloud_academy_conference_2016_4.html" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="https://s3.amazonaws.com/bensmith/website/papers/icacon-2016.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/icacon-2016.pptx" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Conference</td>
<td>B. Smith, J. Feller, "Introduction to IBM's Bluemix Platform-as-a-Service Environment", Second International IBM Cloud Academy Conference (ICACON2014), 2014.</td>
<td><a href="https://research.ibm.com/university/cloudacademy/cloud_academy_conference_2014.html" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="https://s3.amazonaws.com/bensmith/website/papers/icacon-2014.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/icacon-2014.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Conference</td>
<td>B. Smith, L. Williams, "On the Effective Use of Security Test Patterns", Sixth International Conference on Software Security and Reliability (SERE2012), Washington, DC, USA, pp. 108-117, 2012.</td>
<td><a href="http://dx.doi.org/10.1109/SERE.2012.23" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/sere2012.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Conference</td>
<td>A. Massey, B. Smith, P. Otto, A. Antón, "Assessing the Accuracy of Legal Implementation Readiness Decisions," International Requirements Engineering Conference (RE 2011), Trento, Italy, pp. 207-217, 2011.</td>
<td><a href="http://dx.doi.org/10.1109/RE.2011.6051661" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/re2011.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/re2011.pptx" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Conference</td>
<td>B. Smith, L. Williams, "Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities", Proceedings of the International Conference on Software Testing, Verification and Validation (ICST 2011), Berlin, Germany, pp. 220-229, 2011.</td>
<td><a href="http://dx.doi.org/10.1109/ICST.2011.15" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/icst2011.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/icst2011.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Conference</td>
<td>B. Smith, G. Hull, B. Stanton, B. Phillips, "Truckers Drive Their Own Assessment for Obstructive Sleep Apnea: A Collaborative Approach to Online Self-Assessment for Obstructive Sleep Apnea", CHEST 2010, vol. 138, no. 4, 2010.</td>
<td><a href="http://dx.doi.org/10.1378/chest.9867" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/chest2010.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/chest2010.pptx" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Conference</td>
<td>B. Smith, L. Williams, A. Austin, "Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks", Lecture Notes in Computer Science, vol. 5965, Engineering Secure Software and Systems (ESSoS 2010), pp. 192-200, 2010.</td>
<td><a href="http://dx.doi.org/10.1007/978-3-642-11747-3_15" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/essos2010.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/essos2010.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Workshop</td>
<td>P. Morrison, B. Smith, L. Williams, "Surveying Security Practice Adherence in Software Development", Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp (HoTSoS 2017), pp. 85-94, 2017.</td>
<td><a href="https://doi.org/10.1145/3055305.3055312" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Workshop</td>
<td>P. Morrison, B. Smith, L. Williams, "Measuring Security Practice Use: A Case Study at IBM", 2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in Industry (CESI 2017), pp. 16-22, 2017.</td>
<td><a href="https://doi.org/10.1109/CESI.2017.4" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Workshop</td>
<td>B. Smith, "Testing Electronic Health Records Applications with a Security Test Pattern Catalog Developed Using Empirical Data", Proceedings of the International Health Informatics Symposium Doctoral Consortium (IHI 2012), 2012.</td>
<td><a href="https://sites.google.com/site/web2011ihi/participants/doctoral-consortium" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/ihi2012_ds.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/ihi2012_ds.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Workshop</td>
<td>J. King, B. Smith, L. Williams, "Modifying Without a Trace: General Audit Guidelines are Inadequate for Electronic Health Record Audit Mechanisms", Proceedings of the International Health Informatics Symposium (IHI 2012), pp. 305-314, 2012.</td>
<td><a href="http://dx.doi.org/10.1145/2110363.2110399" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/ihi2012.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/ihi2012.pptx" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Workshop</td>
<td>B. Smith, "Systematizing Security Test Planning Using Functional Requirements Phrases". Proceedings of the 33rd international conference on Software engineering Doctoral Consortium (ICSE '11). Honolulu, HI, pp. 1136-1137, 2011.</td>
<td><a href="http://dx.doi.org/10.1145/1985793.1986019" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/icsephdsym2011.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/icseds2011.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Workshop</td>
<td>B. Smith, A. Austin, M. Brown, J. King, J. Lankford, A. Meneely, L. Williams, "Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected", Proceedings of the Security and Privacy in Medical and Home-care Systems (SPIMACS 2010) Workshop, co-located with CCS, Chicago, IL, pp. 1-12, 2010.</td>
<td><a href="http://dx.doi.org/10.1145/1809085.1809094" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/sehc2010.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/sehc2010.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Invited Talk</td>
<td>B. Smith, "Metrics validation criteria: How do we know when a metric is worthwhile?" Presented at Workshop on Security Predictions, Pisa, Italy, 2010.</td>
<td><a href="http://bensmith.s3.amazonaws.com/website/media/metricsValidation.mp3" target="_blank">
<i class="fas fa-file-audio fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/securityPredictions.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Workshop</td>
<td>B. Smith, Y. Shin, and L. Williams, "Proposing SQL Statement Coverage Metrics", Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems (SESS 2008), co-located with ICSE, pp. 49-56, 2008.</td>
<td><a href="http://dx.doi.org/10.1145/1370905.1370912" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/sess2008.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/sess2008.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Workshop</td>
<td>B. H. Smith and L. Williams, "An Empirical Evaluation of the MuJava Mutation Operators", Mutation 2007, co-located with TAIC-PART, pp. 193-202, 2007.</td>
<td><a href="http://portal.acm.org/citation.cfm?id=1308173.1308283" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/mutation2007.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/mutation2007.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Poster</td>
<td>B. Smith, E. Smith, B. Phillips, "Living Well: Do Health Education College Students Sleep Better?", proceedings of SLEEP 2011, Minneapolis, MN, vol. 34, abstract supplement pA264, 2011.</td>
<td><a href="https://academic.oup.com/DocumentLibrary/SLEEP/2011abstractsupplement.pdf" target="_blank">
<i class="fas fa-cloud fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/papers/sleep2011.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
<a href="http://bensmith.s3.amazonaws.com/website/media/sleep2011.ppt" target="_blank">
<i class="far fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Poster</td>
<td>A. Austin, B. Smith, L. Williams, J. Halladay, "How Secure is Your Electronic Health Record System?", presented at North Carolina Academy of Family Physicians Weekend (NCAFPW), Asheville, NC, December 2010.</td>
<td><a href="http://bensmith.s3.amazonaws.com/website/papers/ncfpwPoster2010.pdf" target="_blank">
<i class="fas fa-file-powerpoint fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Poster</td>
<td>B. Smith and L. Williams, "Only Grey Box Testing Can Detect Input Validation and Error Message Information Leakage Vulnerabilities", presented at State of the Art in Testing and Analysis Day (SATA), March 2009.</td>
<td><a href="http://bensmith.s3.amazonaws.com/website/papers/sataPoster2009.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
</tr>
<tr>
<td>Tech Report</td>
<td>B. Smith and L. Williams, "Systematizing Security Test Planning Using Functional Requirements Phrases". North Carolina State University, Technical Report #2011-5.</td>
<td><a href="ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2011/TR-2011-5.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
<tr>
<td>Tech Report</td>
<td>B. Smith and L. Williams, "A Survey on Code Coverage as a Stopping Criterion for Unit Testing", North Carolina State University, Technical Report #2008-22.</td>
<td><a href="ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2008/TR-2008-22.pdf" target="_blank">
<i class="far fa-file-pdf fa-lg"></i></a>
</td>
</tr>
</tbody>
</table>
</div>
<div class="tab-pane fade container" id="creds-tab-pane" role="tabpanel" aria-labelledby="other-tab" tabindex="0">
<h1>Credly Badges</h1>
<div class="row">
<!-- Security Focal -->
<div class="col" data-iframe-width="150" data-iframe-height="300" data-share-badge-id="9f1b4e87-4bde-48eb-a672-5091c7239a60" data-share-badge-host="https://www.credly.com"></div>
<!-- SPbD Practitioner -->
<div class="col" data-iframe-width="150" data-iframe-height="300" data-share-badge-id="53311fc5-e044-4626-bdef-5e1aa1b5246f" data-share-badge-host="https://www.credly.com"></div>
<!-- Enterprise Design Thinking -->
<div class="col" data-iframe-width="150" data-iframe-height="300" data-share-badge-id="cdaacc7c-1d8f-4b99-98f2-eebaebdc1726" data-share-badge-host="https://www.credly.com"></div>
<!-- SPbD Foundations -->
<div class="col" data-iframe-width="150" data-iframe-height="300" data-share-badge-id="5aff2bb3-32ad-4873-b571-ae8a33a3d64f" data-share-badge-host="https://www.credly.com"></div>
<!-- Cloud Application Developer - Author Award for Professionals -->
<div class="col" data-iframe-width="150" data-iframe-height="350" data-share-badge-id="54bf2a6f-801a-4f08-b154-9039dc089ef2" data-share-badge-host="https://www.credly.com"></div>
<!-- This script does the thing; it makes these badges all load and verify for viewer. -->
<script type="text/javascript" async src="https://cdn.credly.com/assets/utilities/embed.js"></script>
</div>
</div>
<div class="tab-pane fade" id="other-tab-pane" role="tabpanel" aria-labelledby="other-tab" tabindex="0">
<h1>Other</h1>
<div class="row">
<div class="col-lg-6 col-md-6 col-sm-6">
<h5>Conference Reviewer</h6>
<ul>
<li><a target="_blank" href="http://www.research.ibm.com/university/cloudacademy/cloud_academy_conference_2015.html">ICACON 2015, </a>
<a target="_blank" href="http://www.research.ibm.com/university/cloudacademy/cloud_academy_conference_2016.html">2016</a></li>
<li><a target="_blank" href="http://2010.msrconf.org/">MSR 2010</a></li>
<li><a target="_blank" href="https://dblp.org/db/conf/agiledc/agile2009">Agile 2009</a></li>
<li><a target="_blank" href="http://www.csc2.ncsu.edu/conferences/issre/2008/">ISSRE 2008</a>, <a target="_blank" href="http://www.datagyan.com/issretest/">2010</a></li>
<li><a target="_blank" href="http://www.esem-conferences.org/2008/">ESEM 2008</a>, <a target="_blank" href="http://www.esem-conferences.org/2010/">2010</a>, <a target="_blank" href="http://esem.cpsc.ucalgary.ca/esem2011/esem/index.html">2011</a></li>
<li><a target="_blank" href="http://www.cs.colostate.edu/icst2008/">ICST 2008</a>, <a target="_blank" href="https://onlinelibrary.wiley.com/toc/10991689/21/3">2009</a>, <a target="_blank" href="https://onlinelibrary.wiley.com/toc/10991689/23/5">2010</a></li>
<li>SECTEST 2008, 2011</li>
<li><a target="_blank" href="https://dl.acm.org/citation.cfm?id=1368088">ICSE 2008</a>, <a target="_blank" href="http://www.sbs.co.za/icse2010/">2010</a>, <a target="_blank" href="http://2011.icse-conferences.org/">2011</a>,
<a target="_blank" href="http://www.ifi.uzh.ch/icse2012/">2012</a></li>
<li><a target="_blank" href="http://www.upc.edu/gessi/re08/">RE 2008</a></li>
<li><a target="_blank" href="http://mutation2009.ist.tugraz.at/">Mutation 2009</a>,
<a target="_blank" href="http://www.st.cs.uni-saarland.de/mutation2010/">2010</a></li>
<li><a target="_blank" href="https://distrinet.cs.kuleuven.be/events/essos/2009/">ESSoS 2009</a>, <a target="_blank" href="http://distrinet.cs.kuleuven.be/events/essos/2012/">2012</a></li>
<li><a target="_blank" href="http://www.sehc.info/sehc2011.htm">SEHC 2011</a></li>
</ul>
</div>
<div class="col-lg-6 col-md-6 col-sm-6">
<h5>Journal Reviewer</h6>
<ul>
<li><a target="_blank" href="http://link.springer.com/journal/10664">Empirical Software Engineering</a></li>
<li><a target="_blank" href="https://digital-library.theiet.org/content/journals/iet-sen">IET Software</a></li>
<li><a target="_blank" href="https://ieeexplore.ieee.org/xpl/aboutJournal.jsp?punumber=8013">IEEE Security and Privacy</a></li>
<li><a target="_blank" href="http://www.sciencedirect.com/science/journal/09505849">Information and Software Technology</a></li>
</ul>
<h5>Conference Organization</h6>
<ul>
<li>Local Arrangements, Web Chair, <a target="_blank" href="http://www.esem-conferences.org/2009/">ESEM 2009</a></li>
</ul>
<h5>Guest lecturer</h6>
<ul>
<li>Guest Lecturer at NC State for Computer Science and Electrical and Computer Engineering 2016-2018.</li>
</ul>
</div>
</div>
</div>
</div>
</main>
</div>
</div>
<script src="https://cdnjs.cloudflare.com/ajax/libs/bootstrap/5.3.3/js/bootstrap.min.js" integrity="sha512-ykZ1QQr0Jy/4ZkvKuqWn4iF3lqPZyij9iRv6sGqLRdTPkY69YX6+7wvVGmsdBbiIfN/8OdsI7HABjvEok6ZopQ==" crossorigin="anonymous" referrerpolicy="no-referrer"></script>
</body>
</html>