Part of our process is to create products and information available for anyone interested. You are welcome to download anything from the links below. 

Our GitHub repositories can be accessed using the link here: GitHub Repositories

Research Technologies

Lab Resume

SECL Resume

The Software Engineering and Cybersecurity Laboratory has many capabilities.  Follow this link to download our Lab resume.

SECL Resume

Pique logo

Pique

Pique is the modeling framework that includes core components and libraries as well as specialized models.

GitHub Repositories

Blaze name in light green on a dark blue/purple background

Blaze

Blaze serves as a foundation for novel research at Montana State University and is actively developed and used by research scientists and hackers from both industry and academia.

Learn more about Blaze>>

Publications

2024

  1. Fuhnwi G., Revelle M., Izurieta C., A Hybrid Anomaly Detection Approach For Obfuscated Malware,” IEEE International Conference on Cybersecurity and Resilience, CSR 2024, London, England, September 2-4, 2024.
  2. Freire S., Rios N., Perez B., Correal D., Ramac R., Mandic V., Tausan N., Lopez G., Mendonca M., Izurieta C., Seaman C., Spinola R.,  “A Comprehensive View on TD Prevention Practices and Reasons for not Preventing It,” Transactions on Software Engineering and Methodology (TOSEM). 2024. In Press.
  3. Reinhold A.M., Boles B., Muneza R., McElroy T., Izurieta C., “Characterizing and Surmounting Challenges in Aggregating Static-Analysis Tool Results,” Military Cyber Affairs, Vol. 7. Issue 1. Article 6. 2024.
  4. Halvorsen J., Izurieta C., Cai H., Gebremedhin A., "Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review," ACM Computing Surveys. 2024.
  5. O'Donoghue E., Reinhold A.M., Izurieta C., "Assessing Security Risks of Software Supply Chains Using Software Bill of Materials," 2nd International Workshop on Mining Software Repositories for Privacy and Security, MSR4P&S, (SANER 2024), Rovaniemi, Finland, March 2024.
  6. Wadhams Z. Reinhold A.M., Izurieta C., "Automating Static Analysis Through CI/CD Pipeline Integration," 2nd International Workshop on Mining Software Repositories for Privacy and Security, MSR4P&S, (SANER 2024), Rovaniemi, Finland, March 2024.
  7. Fuhnwi G., Revelle M., Izurieta C., "Improving Network Intrusion Detection Performance: An Empirical Evaluation Using Extreme Gradient Boosting (XGBoost) with Recursive Feature Elimination," IEEE 3rd, International Conference on AI in Cybersecurity, ICAIC 2024. Houston, TX, USA, February 2024.

2023

  1. Freire S., Rocha V., Mendonca M, Izurieta C., Seaman C., Spinola R., "Assessing IDEA Diagrams for Supporting Analysis of Capabilities and Issues in Technical Debt Management,"International Conference on Product-Focused Software Process Improvement, PROFES '23, Dornbirn, Austria, December 2023.
  2. Reinhold A.M., Gore, R., Ezell, B., Izurieta, C., and Shanahan, E. "From Cyclones to Cybersecurity: A Call for Convergence in Risk and Crisis Communications Research", November 2023
  3. Rahman K., Izurieta C., "An Approach to Testing Banking Software Using Metamorphic Relations,"IEEE 24th International Conference on Information Reuse and Integration for Data Science, IRI 2023, Bellevue WA, USA, August 2023.
  4. Liyanage K., Pearsall R., Izurieta C., Whitaker B., "Dictionary Learning on Graph Data with Weisfieler-Lehman Sub-tree Kernel and KSVD,"2023 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Rhodes Island, Greece, June 2023.
  5. Saha P., Izurieta C., Kanewala U., "A Test Suite Minimization Technique for Testing Numerical Programs,"21st IEEE/ACIS International Conference on Software Engineering, Management and Applications (SERA 2023), May 2023.
  6. Ritzdorf L., Colter B., Major C., Running Crane T., Hezekiah A., Macht B., Izurieta C., LaMeres B., "Evaluating the Effectiveness of Obfuscated Instruction Codes for Malware Resistance,"IEEE Intermountain Engineering, Technology, and Computing Conference (i-ETC), Utah, USA, May 2023.
  7. Nelson G., Izurieta C., Reimanis D., "Membership and Participation in Object Oriented and Procedural Paradigms,"IEEE Intermountain Engineering, Technology, and Computing Conference (i-ETC), Utah, USA, May 2023.
  8. Freire S. et al., Izurieta C., "Software Practitioners' Point of View on Technical Debt Payment,"The Journal of Systems and Software (JSS), February 2023.
  9. Berenguer C. et al., Izurieta C., "Investigating the Relationship between Technical Debt Management and Software Development Issues,"Journal of Software Engineering Research and Development. Volume 11. February 2023.
  10. Izurieta, C., N. Woods, and A.M. Reinhold. 2023. A Brief of Distributed Data Processing. Works in Progress in Embedded Computing Journal 9(2). Web: http://www.wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/40/35
  11. Hastings, Y., and A.M. Reinhold. 2023. Applying Software Quality in Use Standards to Improve Scientific Software Selection. Works in Progress in Embedded Computing Journal. Web: http://wipiec.digitalheritage.me/index.php/wipiecjournal/article/view/42/37
  12. Reinhold, A.M., T. Weber, C. Lemak, D. Reimanis, and C. Izurieta. 2023.  New version, new answer: Investigating cybersecurity static-analysis tool outputs. 2023 IEEE International Conference on Cyber Security and Resilience. DOI: https://doi.org/10.1109/CSR57506.2023.10224930
  13. Fogg, S.K., G.C. Poole, A.M. Reinhold, and S.J. O'Daniel.  Thermal insulation versus capacitance: a simulation experiment comparing effects of shade and hyporheic exchange on daily and seasonal stream temperature cycles.  Hydrological Processes 37(9): e14973. DOI: https://doi.org/10.1002/hyp.14973
  14. Revelle, M., Parker, M., and Orr, K., "Blaze: A Framework for Interprocedural Binary Analysis." Workshop on Binary Analysis Research (BAR). Vol. 2023. 2023.
  15. Zhong, F., Cheng, X., Yu, D., Gong, B., Song, S., Yu, J. (2023) Malfox: Camouflaged adversarial malware example generation  based on conv-gans against black-box detectors. IEEE Transactions on Computers: p. 1-14 (ESI 1% highly cited) retrieved by https://ieeexplore.ieee.org/document/10017127

2022

  1. Soares G. et al., Izurieta C., "Investigating how Agile Software Practitioners Repay Technical Debt in Software Projects,"SBQS 2022, Brazilian Symposium on Software Quality, November 2022.
  2. Rahman K., Izurieta C., "A Mapping Study of Security Vulnerability Detection Approaches for Web Applications,"EuroMicro Software Engineering and Advanced Applications, SEAA 2022, Gran Canaria, Spain, September 2022.
  3. Barbosa L. et al., Izurieta C., "Organizing the TD Management Landscape for Requirements and Requirements Documentation Debt,"Workshop on Requirements Engineering, WER 2022. Brazil (virtual). August 2022.
  4. Rehman F. Izurieta C., "An Approach for Verifying and Validating Clustering Based Anomaly Detection Systems Using Metamorphic Testing,"IEEE AITest, 4th International Conference on AI Testing, San Francisco USA, August 2022.
  5. Rehman F., Izurieta C., "MT4UML: Metamorphic Testing for Unsupervised Machine Learning,"SDS 2022, Swiss Conference on Data Science, Lucerne Switzerland, June 2022
  6. Reinhold, A.M., E.D. Raile, C. Izurieta, J. McEvoy, H. King, G.C. Poole, R.C. Ready, N.T. Bergmann, and E.A. Shanahan. 2022.Persuasion with Precision: A Mixed Methods Procedure for Improving Validity in Risk Communication Treatment Conditions. Journal of Mixed Methods Research. DOI: https://doi.org/10.1177/15586898221096934
  7. Poole, G.C., S.K. Fogg, S.J. O’Daniel, B. Amerson, A.M. Reinhold, S. Carlson, E.J. Mohr, and H.C. Oakland. 2022. The hydrologic geometry of expansive hyporheic zones. PLoS ONE. DOI: https://doi.org/10.1371/journal.pone.0262080
  8. Zhong, F., Chen, Z., Xu, M., Zhang, G., Yu, D., Cheng, X. (2022) Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware ClassificationIEEE Transactions on Computers: v. 72 i. 2 p. 438-451. retrieved by https://ieeexplore.ieee.org/document/9737370
  9. Zhong, F. (2022) Reinforcement learning based adversarial malware example generation against black-box detectorsComputers & Security: v. 121 p. 1-12. retrieved by https://www.sciencedirect.com/science/article/abs/pii/S0167404822002632

2021

  1. LaMeres B., Izurieta C. "CyberShield: A Malware Resistant Computer System Based on Functionally Equivalent, Heterogeneous Processing Cores," 2021. TechID: LBJ-2021-CYBE.
  2. Guerledo C. et al., Izurieta C., "Technical Debt is not Only about Code and We Need to be Aware about It,"SBQS 2021, Brazilian Symposium on Software Quality, November 2021. Distinguished Paper Award.
  3. Ramac R., et al., Izurieta C. "Prevalence, Common Causes and Effects of Technical Debt: Results from a Family of Surveys with the IT Industry,"The Journal of Systems and Software, 2021. https://doi.org/10.1016/j.jss.2021.111114
  4. Freire S. et al., Izurieta C., "Pitfalls and Solutions for Technical Debt Management in Agile Software Projects,"IEEE Software, 2021. doi: 10.1109/MS.2021.3101990
  5. Ramac R. et al., Izurieta C., "Technical and Non-Technical Prioritization Schema for Technical Debt: Voice of TD-Experienced Practitioners,"IEEE Software, 2021. doi: 10.1109/MS.2021.3103121
  6. Nelson G., Izurieta C., "A Gap in the Analysis of Technical Debt in Procedural Languages: An Experiential Report of Go,"IEEE Software, 2021. doi: 10.1109/MS.2021.3103710
  7. Perez B., Castellanos C., Correal D.,  Rios N., Freire S., Spinola R., Seaman S., Izurieta C., "Technical Debt Payment and Prevention Through the Lenses of Software Architects,"Information and Software Technology Journal, Vol. 140, Dec 2021, https://doi.org/10.1016/j.infsof.2021.106692
  8. Rehman F., Izurieta C., "A Hybridized Approach for Testing Neural Network Based Intrusion Detection Systems,"IEEE SmartNets 2021 -CyberSec CIIA International Conference, (Virtual) Glasgow, Scotland, September 22-24, 2021.
  9. Rehman F., Izurieta C., "Statistical Metamorphic Testing of Neural Network Based Intrusion Detection Systems,"IEEE International Conference on Cybersecurity and Resilience, CSR 2021, July 26-28, 2021.
  10. Freire S. et al., Izurieta C., "How Experience Impacts Practitioner's Perception of Causes and Effects of Technical Debt,"14th IEEE International Conference on Cooperative and Human Aspects of Software Engineering, CHASE 2021, March 20-21, 2021.
  11. Rios N., Freire S., Perez B., Castellanos C., Correal D., Mendonca M., Falessi D., Izurieta C., Seaman C., Spinola R., "On the Relationship between Technical Debt Management and Process Models,"IEEE Software, 2021. doi: 10.1109/MS.2021.3058652
  12. Freire S., Rios N., Perez B., Correal D., Izurieta C., Seaman C., Spinola R., "How do Technical Debt Payment Practices Relate to the Effects of the Presence of Debt Items in Software Projects?,"28th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2021,  Virtual (Honolulu, HI, USA) March 9-12, 2021.
  13. Raile, E.D., E.A. Shanahan, J. McEvoy, C. Izurieta, N.T. Bergmann, R. Ready, A.M. Reinhold, and G.C. Poole. 2021. Narrative Risk Communication as a Lingua Franca for Natural Environmental Hazard Preparation.  Environmental Communication.  DOI: https://doi.org/10.1080/17524032.2021.1966818.Pre-analysis plan ID# 20190729AA published at https://doi.org/10.17605/OSF.IO/P3D64
  14. Chen, Z., Zhong, F., Chen, Z., Zhang, X, Pless., P, Cheng, X. (2021) DCAP: Deep Cross Attentional Product Network for User Response Prediction. Proceedings of the 30th ACM International Conference on Information and Knowledge Management (CIKM ’21): p. 221-230. retrieved by https://dl.acm.org/doi/abs/10.1145/3459637.3482246

2020

  1. Rios N., Perez B., Correal D., Mendonca M., Izurieta C., Seaman C., Spinola R., "Surveying Software Practitioners on Technical Debt Payment Practices and Reasons for not Paying off Debt Items,"24th International Conference on Evaluation and Assessment in Software Engineering, EASE 2020, Trondheim, Norway, April 15-17, 2020.
  2. Freire S. Rios N., Mendonca M., Falessi D., Seaman C., Izurieta C., Spinola R., "Actions and Impediments for Technical Debt Prevention: Results from a Global Family of Industrial Surveys,"35th ACM/SIGAPP Symposium on Applied Computing, Brno, Czech Republic, March 30 - April 3, 2020.
  3. Rios N., Mendes L.,  Cardeiral C., Magalhaes A., Perez B., Correal D., Astudillo H., Seaman C., Izurieta C., Santos G., Spinola R., "Hearing the Voice of Software Practitioners on Causes, Effects, and Practices to Deal with Documentation Debt,"26th Intl. Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2020, Pisa, Italy, March 24-27, 2020.
  4. West, N.M., and A.M. Reinhold (co-first authors), G.C. Poole, and E.K. Espeland.  2020.Flood dynamics dictate distributions of Russian olive Elaeagnus angustifolia on riverine floodplains.  Biological Invasions. DOI: https://doi.org/10.1007/s10530-020-02352-z
  5. Fogg, S.K., S.J. O'Daniel, G.C. Poole, A.M. Reinhold, and A. Hyman.  2020.  A simple, reliable method for long‐term, in‐stream data logger installation using rock climbing hardware.  Methods in Ecology and Evolution.  DOI: https://doi.org/10.1111/2041-210X.13367
  6. Bergmann, N., J. McEvoy, E.A. Shanahan, E. Raile, A.M. Reinhold, G.C. Poole, and C. Izurieta.  2020.  Thinking through levees: how political agency extends beyond the human mind.          Annals of the American Association of Geographers.  DOI: https://doi.org/10.1080/24694452.2019.1655387
  7. Jia, Y., Zhong*, F., Alrawais, A., Gong, B., Cheng, X. (2020) Flowguard: An intelligent edge defense mechanism against IoT DDoS attacksIEEE Internet of Things Journal: v. 7 i. 10 p. 9552-9562 (ESI 1% highly cited) retrieved by https://ieeexplore.ieee.org/abstract/document/9090824

2019

  1. Izurieta C., Reimanis D., Griffith I., Schanz T. "Structural and Behavioral Taxonomies of Design Pattern Grime," 12th Seminar on Advanced Techniques & Tools for Software Evolution. SATToSE 2019, Vol. 2510, ISSN 1613-0073, http://ceur-ws.org/Vol-2510, Bolzano, Italy, July 8-10, 2019.
  2. Reimanis D., Izurieta,C, "Behavioral Evolution of Design Patterns: Understanding Software Reuse through the Evolution of Pattern Behavior," 18th International Conference on Software Systems and Reuse, ICSR 2019. In: Peng X., Ampatzoglou A., Bhowmik T. (eds) Reuse in the Big Data Era. Vol 11602, Springer Cham. https://doi.org/10.1007/978-3-030-22888-0_6 Cincinnati, OH, June 26-28 2019.
  3. Izurieta C., Prouty M., "Leveraging SecDevOps to Tackle the Technical Debt Associated with Cybersecurity Attack Tactics," ACM-IEEE Second International Conference on Technical Debt, TechDebt 2019, Montreal, Canada, May 26-27, 2019.
  4. Shanahan, E.A., A.M. Reinhold, E.D. Raile, G.C. Poole, R. Ready (co-first authors), J. McEvoy, N. Bergmann, C. Izurieta, and H. King.  2019.  Characters matter: How narratives shape affective responses to risk communication.  PLoS ONE.  14(12):e0225968. DOI: https://doi.org/10.1371/journal.pone.0225968
  5. Reinhold, A.M., G.C. Poole, C. Izurieta, A.M. Helton, and E.S. Bernhardt.  2019.  Constraint-based simulation of multiple interactive elemental cycles in biogeochemical systems.  Ecological Informatics.  50:102-121.  DOI: https://doi.org/10.1016/j.ecoinf.2018.12.008
  6. Tornabene, B.J., M.E. Jaeger, R.G. Bramblett, M. Nelson, N. McClenning, T. Watson, A. Ankrum, K. Frazer, A.M. Reinhold, and A.V. Zale.  2019.  Riverine turtles select habitats maintained by natural discharge regimes in an unimpounded large river.  River Research and Applications.  35:1489-1498.  DOI: https://doi.org/10.1002/rra.3496

2018

  1. Izurieta C., Rice D., Kimball K., Valentien T., "A Position Study to Investigate Technical Debt Associated with Security Weaknesses," ACM-IEEE First International Conference on Technical Debt, TechDebt2018, Gothenburg, Sweden, May 27-28 2018.
  2. Reinhold, A.M., G.C. Poole, R.G. Bramblett, A.V. Zale, and D.W. Roberts.  2018.  Landscape assessment of side-channel plugs and associated cumulative side-channel attrition across a large river floodplain.  Environmental Monitoring and Assessment.  190:305.  DOI: https://doi.org/10.1007/s10661-018-6673-8
  3. Raile, E.D., H. King, E.A. Shanahan, J. McEvoy, C. Izurieta, N. Bergmann, K. French, R. Ready, A.M. Reinhold, and G.C. Poole.  2018.  Narrative-based risk communication: a lingua franca for natural hazard messages? Conference Paper of the Midwest Political Science Association 2018 Annual Meeting. Preprint: https://www.cs.montana.edu/izurieta/pubs/mpsa2018.pdf

2017

  1. Griffith I., Izurieta C., Huvaere C., "An Industry Perspective to Comparing the SQALE and Quamoco Software Quality Models," 11th ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2017, Toronto, Canada, November 9-10, 2017.
  2. Perreault L., Berardinelli S., Izurieta C., Sheppard J., "Using Classifiers for Software Defect Detection," 26th International Conference on Software Engineering and Data Engineering, SEDE 2017, San Diego, California, October 2-4, 2017.
  3. Rojas G., Izurieta C., Griffith I., "Toward Technical Debt Aware Software Modeling," IEEE-ACM Ibero-American Conference on Software Engineering CibSE 2017, Buenos Aires, Argentina, May 22-23, 2017.
  4. Reinhold, A.M., R.G. Bramblett, A.V. Zale, G.C. Poole, and D.W. Roberts.  2017.  Spatially-dependent responses of a large river fish assemblage to bank stabilization and side channels.  Transactions of the American Fisheries Society 146:967-982. DOI: https://doi.org/10.1080/00028487.2017.1290682

2016

  1. Izurieta C., Ozkaya I., Seaman C., Kruchten P., Nord R., Snipes W., Avgeriou P., "Perspectives on Managing Technical Debt. A Transition Point and Roadmap from Dagstuhl," 1st International Workshop on Technical Debt Analytics (TDA). In association with the 23rd Asia-Pacific Software Engineering Conference (APSEC), University of Waikato, Hamilton, New Zealand, December 6-9 2016.
  2. Reimanis D., Izurieta C., "Towards Assessing the Technical Debt of Undesired Software Behaviors in Design Patterns," IEEE ACM MTD 2016 8th International Workshop on Managing Technical Debt. In association with the 32nd International Conference on Software Maintenance and Evolution, ICSME, Raleigh, North Carolina, October 4, 2016.
  3. Assefi M., Liu G.,Wittie M.P.,Izurieta C., "Measuring the Impact of Network Performance on Cloud-Based Speech Recognition Applications," International Journal of Computer Applications IJCA, Vol. 23 - 1, March 2016.
  4. Reinhold, A.M., R.G. Bramblett, A.V. Zale, D.W. Roberts, and G.C. Poole.  2016.  Comparative use of side and main channels by small-bodied fish in a large, unimpounded river.  Freshwater Biology 61:1611-1626.  DOI: https://doi.org/10.1111/fwb.12796

2015

  1. Carroll C., Falessi D., Forney V., Frances A., Izurieta C., Seaman C., "A Mapping Study of Software Causal Factors for Improving Maintenance,"9th ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2015, Beijing, China, October 22-23, 2015.
  2. Reimanis D., Izurieta C., "A Research Plan to Characterize, Evaluate, and Predict the Impacts of Behavioral Decay in Design Patterns," IEEE ACM IDoESE, 13th International Doctoral Symposium on Empirical Software Engineering, Beijing, China, October 19 2015.
  3. Assefi M., Liu G., Izurieta C., Wittie M.P., "An Experimental Evaluation of Apple Siri and Google Speech Recognition,"24th International Conference on Software Engineering and Data Engineering, SEDE 2015, San Diego, California, October 12-14, 2015.
  4. Goel U., Izurieta C., Wittie M.P., "Understanding Factors Influencing the Citation Count of Networking Conference Papers,"24th International Conference on Software Engineering and Data Engineering, SEDE 2015, San Diego, California, October 12-14, 2015.
  5. Izurieta C., Rojas G., Griffith I., "Preemptive Management of Model Driven Technical Debt for Improving Software Quality,"11th International ACM SigSoft Conference on the Quality of Software Architectures, QoSA 2015, Montreal, Canada, May 4-8, 2015.

2014

  1. Griffith I., Izurieta C., Taffahi H., Claudio D., "A Simulation Study of Practical Methods for Technical Debt Management in Agile Software Development,"Winter Simulation Conference WSC 2014, Savannah, GA, December 7-10, 2014.
  2. Griffith I., Reimanis D., Izurieta C., Codabux Z., Deo A., Williams B., "The Correspondence between Software Quality Models and Technical Debt Estimation Approaches,"IEEE ACM MTD 2014 6th International Workshop on Managing Technical Debt. In association with the 30th  International Conference on Software Maintenance and Evolution, ICSME, Victoria, British Columbia, Canada, September 30, 2014.
  3. Zazworka N., Vetro A., Izurieta C., Wong S., Cai Y., Seaman C., Shull F., "Comparing Four Aproaches for Technical Debt Identification,"Springer Software Quality Journal. Vol.2, Issue 3, pp. 403-426. September 2014. doi: 10.1007/s11219-013-9200-8.
  4. Reimanis D., Izurieta C., Luhr R., Xiao L., Cai Y., Rudy G., "A Replication Case Study to Measure the Architectural Quality of a Commercial System,"8th ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, Torino, Italy, September 2014.
  5. Griffith I., Izurieta C., "Design Pattern Decay: The Case for Class Grime,"8th ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, Torino, Italy, September 2014.
  6. Dale M., Izurieta C., "Impacts of Design Pattern Decay on System Quality,"8th ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, ESEM 2014, Torino, Italy, September 2014.
  7. Zazworka N., Vetro A., Izurieta C., Wong S., Cai Y., Seaman C., Shull F., "Comparing four approaches for Technical Debt identification: Analysis on Hadoop Project," Book Chapter 3.2, pages 65-84. In Assessing The Impact Of Automatic Static Analysis On Software Quality, by Vetro A., Morisio M., and Torchiano M. Scholar's Press, http://porto.polito.it/2531301/ISBN-13: 978-3-639-70516-4, 20 February, 2014.

2013

  1. Griffith I., Izurieta C., "Design Pattern Decay: An Extended Taxonomy and Empirical Study of Grime and its Impact on Design Pattern Evolution,"IEEE ACM IDoESE, 11th International Doctoral Symposium on Empirical Software Engineering, Baltimore, USA, October 9 2013.
  2. Schuh M., Sheppard J., Strasser S., Angryk R., Izurieta C., "An IEEE standards-based visualization tool for knowledge discovery in maintenance event sequences,"IEEE Aerospace and Electronic Systems Magazine, Vol. 28, Issue 7, pp. 30-39, July 2013.
  3. Luhr R., Reimanis D., Cross R., Izurieta C., Poole G.C., Helton A., "Natural Science Visualization Using Digital Theatre Software,"IEEE ICISA International Conference on Information Science and Applications, Pattaya, Thailand, June 24-26, 2013.
  4. Izurieta C., Griffith I., Reimanis D., Luhr R., "On the Uncertainty of Technical Debt Measurements,"IEEE ICISA 2013 International Conference on Information Science and Applications, Pattaya, Thailand, June 24-26, 2013.
  5. Izurieta C., Bieman J.M. "A Multiple Case Study of Design Pattern Decay, Grime, and Rot in Evolving Software Systems."Springer Software Quality Journal. June 2013. Vol 21, Issue 2, pp. 289-323. doi: 10.1007/s11219-012-9175-x.

2012

  1. Morrison-Smith S., Marmon C., Dighans S., Daniels T., Izurieta C., "Technical Debt Reduction Using a Game Theoretic Competitive Source Control Approach,"ISCA 25th International Conference on Computer Applications in Industry and Engineering, CAINE '12, New Orleans, Louisiana, November 14-16, 2012. Highlighted in the Council on Undergraduate Research, CUR Journal, Winter 2012, Vol 33, Number 2.
  2. Izurieta C., Vetro A., Zazworka N., Cai Y., Seaman C., Shull F., "Organizing the Technical Debt Landscape."IEEE ACM MTD 2012 3rd International Workshop on Managing Technical Debt. In association with the 34th  International Conference on Software Engineering ICSE, Zurich, Switzerland, June 2-9, 2012.
  3. Seaman C., Guo Y., Izurieta C., Cai Y., Zazworka N., Shull F., Vetro A., "Using Technical Debt Data in Decision Making: Potential Decision Approaches."IEEE ACM MTD 2012 3rd International Workshop on Managing Technical Debt. In association with the 34th  International Conference on Software Engineering ICSE, Zurich, Switzerland, June 2-9, 2012.

2011

  1. Griffith I., Wahl S., Izurieta C., "Evolution of Legacy System Comprehensibility through Automated Refactoring."IEEE ACM MALETS 2011 International Workshop on Machine Learning Technologies in Software Engineering. In association with the 26th International Conference on Automated Software Engineering ASE, Lawrence, Kansas, November 7-12, 2011.
  2. Griffith I., Wahl S., Izurieta C., "TrueRefactor: An Automated Refactoring Tool to Improve Legacy System and Application Comprehensibility."ISCA 24th International Conference on Computer Applications in Industry and Engineering, CAINE '11, Honolulu, HI, November 2011.
  3. Strasser S., Frederickson C., Fenger K., Izurieta C., "An Automated Software Tool for Validating Design Patterns."ISCA 24th International Conference on Computer Applications in Industry and Engineering, CAINE '11, Honolulu, HI, November 2011.
  4. Schuh M., Sheppard J., Strasser S., Angryk R., Izurieta C. "Ontology-Guided Knowledge Discovery of Event Sequences in Maintenance Data."IEEE AutoTestCon Conference 2011,  Baltimore, Maryland, USA, September 12-15, 2011. Best Conference Student Paper Award.
  5. Strasser S., Sheppard J., Schuh M., Angryk R., Izurieta C. "Graph-Based Ontology-Guided Data Mining for D-Matrix Model Maturation."IEEE Aerospace Conference AIAA Technical Co-Sponsor, IEEEAS '11, Big Sky, Montana, USA, March 5-12, 2011.