SELECTED RECENT PUBLICATIONS

 

Note: All minor publications (workshops, presentations, internal reports, etc.) are explicitly excluded.

 

In Print

 

Black-Box String Test Case Generation through a Multi-Objective Optimization, A. Shahbazi, J. Miller, IEEE Transactions on Software Engineering

 

Identifying Semantic Blocks in Web Pages Using Gestalt Laws of Grouping, Z. Xu, J. Miller, Journal of the World Wide Web

 

Using π-calculus for Formal Modelling and Verification of WS-CDL Choreographies", A. Khaled, J Miller, IEEE Transactions on Services Computing.

 

Test Case Prioritization Using Extended Digraphs, S. S. Emam, J. Miller, ACM Transactions on Software Engineering and Methodology.

 

An Investigation of Implicit Features in Compression-Based Learning for Comparing Webpages, T-C Chen, T. Stepan, S. Dick, J. Miller, Pattern Analysis and Applications

 

ADAMAS: Interweaving Unicode and Color to Enhance CAPTCHA Security, N. Roshanbin, J. Miller, Future Generation Computer Systems

 

The Kanban Approach, Between Agility and Leanness: A Systematic Review, O. Al-Baik, J. Miller, Empirical Software Engineering.

 

2016

 

Kaizen Cookbook: The Success Recipe for Continuous Learning and Improvements, O. Al-Baik, J. Miller, Hawaii International Conference on System Sciences, 2016

 

Policy Generator (PG): A Heuristic-Based Fuzzer, A. Felix, A. Tappenden, J. Miller, Hawaii International Conference on System Sciences, 2016

 

2015

 

Enhancing Hardware Assisted Test Insertion Capabilities on Embedded Processors using a FPGA-based Agile Test Support co-processor, M. Smith, S. Islam, D. Deng, J. Miller, The Journal of Signal Processing Systems, Vol. 79, pp. 285 – 298, 2015

 

A New Webpage Classification Model based on Visual Information using Gestalt Laws of Grouping, Z Xu, J. Miller, 16th International Conference on Web Information System Engineering, 2015

 

 

2014

 

Waste Identification and Elimination in Information Technology Organizations, O. Al-Baik, J. Miller, Empirical Software Engineering. Volume 19, Issue 6, Page 2019-2061, 2014

 

Towards Real Time Contextual Advertising, A Panwar, I-V Onut, J Miller, 15th International Conference on Web Information System Engineering, 2014

 

Extended Subtree: A New Similarity Function for Tree Structured Data, A. Shahbazi, J. Miller, IEEE Transactions on Knowledge and Data Engineering, Vol. 26, No. 4, pp 864-877, 2014

 

Automated Cookie Collection Testing, A. Tappenden, J. Miller, ACM Transactions on Software Engineering and Methodology, Vol. 23, No. 1, 3:1 – 3:40, 2014

 

An empirical investigation of web session workloads, S. Dick, O. Yazdanbaksh, X. Tang, T. Huynh, J. Miller, Information Processing and Management, Vol. 50, No. 1, pp. 41 – 53, 2014

 

An Anti-Phishing System Employing Diffused Information, T-C Chen, T Stepan, S Dick, J Miller: ACM Transactions on Information Systems and Security, 16(4): 16, 2014

 

 

2013

 

Ian Reay, Patricia Beatty, Scott Dick, James Miller: Privacy policies and national culture on the internet. Information Systems Frontiers 15(2): 279-292 (2013)

 

Ming Ying, James Miller: Refactoring legacy AJAX applications to improve the efficiency of the data exchange component. Journal of Systems and Software 86(1): 72-88 (2013)

 

Ejike Ofuonye, James Miller: Securing web-clients with instrumented code and dynamic runtime monitoring. Journal of Systems and Software 86(6): 1689-1711 (2013)

 

Narges Roshanbin, James Miller: A Survey and Analysis of Current CAPTCHA Approaches. J. Web Eng. 12(1&2): 1-40 (2013)

 

Ali Shahbazi, Andrew F. Tappenden, James Miller: Centroidal Voronoi Tessellations - A New Approach to Random Testing. IEEE Trans. Software Eng. 39(2): 163-183 (2013)

 

Joshua Charles Campbell, Chenlei Zhang, Zhen Xu, Abram Hindle, James Miller: Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis. MSR 2013: 57-

 

2012

 

Constructing High Quality Use Case Models: A Systematic Review of Current Practices, M. El-Attar, J Miller, Requirements Engineering Journal, Vol. 17, No. 3, pp 187 – 201. 2012

 

Refactoring Flash Embedding Methods, Y. Ming, J. Miller, International Journal of Systems and Service-Oriented Engineering, Vol 3, No. 3, pp 26 – 40, 2012

 

Is In-Depth Object-Oriented Knowledge Necessary to Develop Quality Robustness Diagrams?, M. El-Attar, M. O. Elish, S. Mahmood, J. Miller, Journal of Software, Vol 7, No 11, pp. 2538-2552, Nov 2012

 

Embracing Composite Metrics in Software Experiments, M. El-Attar, R. Singh, J. Miller, Journal of Software, Vol. 7, No. 7, pp. 1664 – 1676, 2012

 

On Spam Susceptibility and Browser Updating, E. Luong, T. Huynh, J. Miller, International Journal of Systems and Service-Oriented Engineering, Vol 3, No. 1, pp 44 – 57, 2012

 

AIWAS: The Automatic Identification of Web Attacks System, T. Huynh, J. Miller, International Journal of Systems and Service-Oriented Engineering, Vol 3, No. 1, pp 73 – 91, 2012

 

2011

 

Consumer Trust in E-Commerce Websites: A Meta-Study, P. Beatty, I. Reay, S. Dick, J. Miller, ACM Computing Surveys, Vol. 43, No. 3, Article 14, 46 pages, 2011

 

Token-based Graphical Password Authentication, J. Gyorffy, A. Tappenden, J Miller, International Journal of Information Security,  Vol. 10, No. 6, pp. 321-336, 2011

 

A User-Centric Evaluation of the Readability of Privacy Policies in Popular Web Sites, R. I. Singh, M. Sumeeth, J. Miller, Information Systems Frontiers, Vol. 13, No. 4, pp. 501 – 514, 2011

 

Finding Homoglyphs — a step towards detecting Unicode-based visual spoofing attacks, N. Roshanbin, J. Miller, The 12th International Conference on Web Information System Engineering, 2011

 

Migrating Functional Requirements in SSUCD Use Cases to a More Formal Representation, M. El-Attar, J. Miller, 6th International Conference on Software Engineering Advances, 2011

 

Refactoring Traditional Forms into Ajax-enabled Forms, M. Ying, J. Miller, 18th Working Conference on Reverse Engineering

 

Issues Surrounding Moving a Successful Business Oriented Test Driven Development Process into the Environment of Real-time Embedded Systems, M. Smith, A. Beaudin, J. Miller, C. Steinback, S. Islam, M. Poulin, The 22nd IET Irish Signals and Systems Conference

 

Evaluating the Readability of Privacy Policies in Mobile Environments. R. I. Singh, M. Sumeeth, J. Miller, International Journal of Mobile Human Computer Interaction, Vol. 3, No. 1, pp 55 - 78

 

ART- Improving Execution Time for Flash Applications, M. Ying, J. Miller, International Journal of Systems and Service-Oriented Engineering, Vol 2, No. 1, pp 1 – 20

 

FTT: A System to Refactor Traditional Forms into Ajax-Enabled Forms. M. Ying, J. Miller, International Journal of Systems and Service-Oriented Engineering, Vol. 2, No.1, 1-20, 2011

 

2010

 

Detecting Visually Similar Web Pages: Application to Phishing Detection, T-C Chen, S. Dick, J. Miller, ACM Transactions on Internet Technology, Vol. 2, No. 10, pp 5:1- 5:38

 

Chronological fault-based mutation processes for WS-BPEL 2.0 programs, A. Khaled, J. Miller, International Journal Web Engineering and Technology, Vol. 6, No.2, pp. 141 - 170

 

Developing Comprehensive Acceptance Tests from Use Cases and Robustness Diagrams, M. El-Attar, J. Miller, Requirements Engineering Journal Vol. 15, No. 3,  pp. 285-306

 

Empirical Knowledge Discovery by Triangulation in Computer Science, R.I. Singh, J. Miller, Advances in Computers, Vol. 80, pp 163 – 190

 

On the causes of open source web systems vulnerabilities, T. Huynh, J. Miller, Journal of Empirical Software Engineering, Vol. 15, No. 15, pp 556 – 576

 

Improving the Quality of Use Case Models Using Antipatterns, M. El-Attar, J. Miller, Journal of Software and Systems Modeling, Vol. 9, No.2, pp 140 – 160

 

Are Online Privacy Policies Readable? M. Sumeeth, R.I. Singh, J. Miller, International Journal of Information Security and Privacy, Vol. 4, No. 1, pp 91 -- 114

 

Prevalence and Classification of Web Page Defects, E. Ofuonye, P. Beatty, S. Dick, J. Miller, Online Information Review, Vol. 34, No. 1, pp 160 -- 174

 

Feature and Product Markup Languages in service-oriented CAX collaboration, A. Khaled, Y. Ma, J. Miller, International Journal of Manufacturing Research, Vol. 5, No. 1, pp. 87 - 101

 

Investigating the Distributional Property of the Session Workload, J. Miller, T. Huynh, Journal of Web Engineering, Vol. 9, No. 1, pp 25 -- 47

 

Practical Elimination of External Interaction Vulnerabilities in Web Applications, T. Huynh, J. Miller, Journal of Web Engineering, Vol. 9, No. 1, pp 1 -- 24

 

2009

 

A Novel Evolutionary Approach for Adaptive Random Testing, A. Tappenden, J. Miller, IEEE Transactions on Reliability, Vol. 58, No. 4, pp. 619- 633

 

“Do You Know Where Your Data Is?  A Study of the Effect of Enforcement Strategies on Privacy Policies” I. Reay, P. Beatty, S. Dick, J. Miller, International Journal of Information Security and Privacy, Vol. 3, No. 4, 68 -- 95

 
Empirical Observations on the Session Timeout Threshold, T Huynh, J. Miller, Journal of Information Processing & Management, Vol. 45, No. 5, pp. 513 -- 528

 

Cookies: A Deployment Study and the Testing Implications, A. Tappenden, J. Miller, ACM Transactions on the Web, Vol. 3, No. 3, pp. 9:1 -- 9:49

 

A survey of cookie technology adoption amongst nations, A. Tappenden, J. Miller, Journal of Web Engineering, Vol. 8, No. 3, pp 211 – 244

 

A Subject-Based Empirical Evaluation of SSUCD's Performance in Reducing Inconsistencies in Use Case Models, M. El-Attar, J. Miller, Journal of Empirical Software Engineering, Vol. 14, pp. 477 -- 512

 

A large scale empirical study of P3P privacy policies: stated actions versus legal obligations, I Reay, S. Dick, J. Miller, ACM Transactions on the Web, Vol. 3(2), pp. 6:1 – 6:33, 2009

 

An Embedded Test oriented production methodology, M. Smith, S. Daenick, J Miller, The Journal of Signal Processing Systems, Vol. 56, pp 69 – 89, 2009

 

Another viewpoint on "Evaluating Web Software Reliability Based on Workload and Failure Data Extracted from Server Logs", T. Huynh, J. Miller, Journal of Empirical Software Engineering, Vol. 14, pp. 371 – 396, 2009

 

A More Agile Approach to Embedded System Development, M. Smith, J. Miller, L. Huang, A. Tran,  IEEE Software, Vol. 26, no. 3, pp. 50-57,  2009

 

An Analysis of Privacy Signals on the World Wide Web: Past, Present and Future, I Reay, S Dick, J Miller, Information Sciences, Vol. 179, No. 8, pp. 1102-1115,  2009

 

A Scalable Testing Framework for Location Based Services, J Yu, A Tappenden, J Miller, M Smith, Journal of Computer Science and Technology, Vol. 24, No. 2, pp 386 – 404, 2009

 

Mobile ICT support for the continuum of Care, M. Miyazaki, T. Ohyanagi, L. Liu, B. Dobbs, M. Rowe, S. Sutphen, J. Miller, A. Cook, Advances in Information Technology and Communication in Health, Volume 143 Studies in Health Technology and Informatics, IOS Press

 

2008

 

Resolving JavaScript Vulnerabilities in Browser Runtime, E. Ofuonye, J. Miller, 19th IEEE International Symposium on Software Reliability Engineering

 

How Do We Build Trust Into Ecommerce Web Sites? E. Ofuonye, P. Beatty, I. Reay, S. Dick, J. Miller, IEEE Software Vol 25 , No. 5, pp. 7 – 9

 

The Theory and Implementation of InputValidator A Semi-Automated Value-Level Bypass Testing Tool, J Miller, L. Zhang, E. Ofuonye, M. Smith, International Journal of Information Technology and Web Engineering, Vol. 3, No. 3, pp 28 -  49

 

Triangulation as a basis for knowledge discovery in Software Engineering, J Miller, Journal of Empirical Software Engineering, Vol. 13, No. 2, pp 223 - 228

 

Producing Robust Use Case Diagrams via Reverse Engineering of Use Case Descriptions, M. El Attar, J. Miller, Journal of Software and Systems Modelling, vol. 7, No. 1, pp. 67 - 84, 2008 

 

A Three-Tiered Testing Strategy for Cookies, A. Tappenden, J. Miller, 1st IEEE International Conference on Software Testing, Verification and Validation 

 

A Service Oriented Architecture for CAX Concurrent Collaboration, A. Khaled, Y. Ma, and J. Miller, The 4th Annual IEEE Conference on Automation Science and Engineering (CASE 2008)

 

Is HTML in a Race to the Bottom?, Patricia Beatty, Scott Dick, and James Miller, IEEE Internet Computing, Vol. 13 , No. 2, pp. 76 - 81, 2008

 

On the possibilities of (pseudo-) software cloning from external interactions, M. Reformat, X. Chai, J. Miller, Soft Computing, Vol. 12, No. 1, pp.  29-49, 2008

 

2007

 

 

A Survey and Analysis of the P3P Protocol's Agents, Adoption, Maintenance, and Future, I. Reay, T. Beatty, S. Dick, J. Miller, IEEE Transactions on Dependable and Secure Computing, Vol. 5, No. 2, pp 151 – 164, 2007

 

A Practical Approach to Testing GUI Systems, P. Li, T. Huynh, M. Reformat, J. Miller, Journal of Empirical Software Engineering, Vol. 12, No. 4, pp. 331 - 357

 

Modelling defects in e-projects, J. Ferguson, J. Miller, International Journal of Information Technology and Web Engineering, Vol. 2, No. 3, pp. 1 – 16, 2007

 

Replication's Role in Software Engineering, A. Brooks, M. Roper, M. Wood, J. Daly, and J. Miller. In Guide to Advanced Empirical Software Engineering. Edited by F. Schull and J. Singer and D. Sjoberg, Springer-Science, pp. 365-379.

 

A TDD Approach to Introducing Students to Embedded Programming, J. Miller, M. Smith, The 12th Annual Conference on Innovation Technology in Computer Science Education (ItiCSE), 2007

 

Empirical Evaluation of Optimisation Algorithms When Used in Goal-oriented Automated Test Data Generation Techniques, M. Xiao, M. El-Attar, M. Reformat, J. Miller, Journal of Empirical Software Engineering, vol. 12, pp. 183 – 239, 2007

 

P3P Adoption on E-Commerce Websites: A Survey & Analysis, T. Beatty, I. Reay, S. Dick, J. Miller, IEEE Internet Computing, Vol. 11(2), pp. 65 – 71, 2007

 

A User-Centered Approach to Modeling BPEL Business Processes Using SUCD Use Cases, M. El Attar, J. Miller, e-Informatica - Software Development Theory, Practice and Experimentation (Journal), Vol. 1(1), pp. 61 – 78, 2007

 

2006

 

 

COTS Acquisition Process: Incorporating Business Factors into COTS Vendor Evaluation Taxonomies, J. Miller, H.C. Yeoh, Software Process Improvement and Practice, Vol. 11, pp. 601 – 626, 2006

 

An XP inspired test-oriented life-cycle production strategy for building embedded biomedical applications, J. Miller, M. Smith, S. Daenick, J. Chen, J. Qiao, F. Huang, A. Kwan and M. Roper, TAIC PART, 2006

 

Matching Antipatterns to Improve the Quality of Use Case Models, M. El-Attar, J. Miller, 14th IEEE International Requirements Engineering Conference, 2006

 

AGADUC: Towards a More Precise Presentation of Functional Requirements in Use Case Models, M. El-Attar, J. Miller, 4th ACIS International Conference on Software Engineering, Research, Management and Applications, 2006

 

Approaches to validating the “quantity” in quantitative MR cerebral perfusion studies, M. R. Smith, J. Miller, L. Ko, J. Chen, A. Geras, R. Frayne, 3rd International Conference on Advances in Medical, Signal and Information, 2006

 

Configuring Hybrid Agile-Traditional Software Processes, A. Geras, M. Smith, J. Miller, 7th International Conference on eXtreme Programming and Agile Processes in Software, 2006

 

Extending the Embedded System E-TDDunit Test Driven Development Tool For Development of a Real Time Video Security System Prototype, S. Daeninck, M. R. Smith, J. Miller and L. Ko 7th International Conference on eXtreme Programming and Agile Processes in Software, 2006.

 

AreFit/FitNesse Appropriate for Biomedical Engineering Research? Jingwen Chen, Michael Smith, Adam Geras, James Miller, 7th International Conference on eXtreme Programming and Agile Processes in Software, 2006

 

Agile Development of Secure Web-Based Applications, A. Tappenden, T. Huynh, J. Miller, A. Geras, M. Smith, International Journal of Information Technology and Web Engineering, Vol. 1(2), pp. 1 – 24, 2006

 

Automatic Test Data Generation Using Genetic Algorithm and Program Dependence Graphs, J. Miller, M. Reformat and H. Zhang, Journal of Information and Software Technology, Vol. 48, pp. 586 – 605, 2006

 

Developing Secure Web-based Applications, T. Huynh, J. Miller, 1st IEEE International Symposium on Secure Software Engineering, 2006

 

2005

 

 

Further Investigations into Evaluating Website Reliability, T. Huynh, J. Miller, 4th International Symposium on Empirical Software Engineering, 2005

 

Agile Security Testing of Web-Based Systems via HTTPUnit, A. Tappenden, P. Beatty, J. Miller, A. Geras, M. Smith, Agile 2005

 

Testing the Semantics of W3C XML Schema, J.B. Li, J. Miller, COMPSAC 2005

 

A Survey of Test Notations and Tools for Customer Testing, A. Geras, J. Miller, M. Smith, J. Love, 6th International Conference on eXtreme Programming and Agile Processes in Software, 2005

 

Agile Testing of Location-Based Services, J. Yu, A. Tappenden, A. Geras, M. Smith, J. Miller, 6th International Conference on eXtreme Programming and Agile Processes in Software, 2005

 

E-TDD -- Embedded Test Driven Development: A Tool for Hardware-Software Co-design Projects, M Smith, A Kwan, A Martin, J Miller, 6th International Conference on eXtreme Programming and Agile Processes in Software, 2005

 

Replicating Software Engineering Experiments: A poisoned Chalice or the Holy Grail, J. Miller, Journal of Information and Software Technology, Vol. 47, pp. 233 – 244, 2005

 

2004 and Before

 

Ancient History – please contact an archaeologist!