Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Robin A. Gandhi
@article{DBLP:journals/cais/GermonprezGL21, author = {Matt Germonprez and Robin A. Gandhi and Georg J. P. Link}, title = {The Routinization of Open Source Project Engagement: The Case of Open Source Risk Management Routines}, journal = {Commun. Assoc. Inf. Syst.}, volume = {49}, pages = {39}, year = {2021}, url = {https://doi.org/10.17705/1cais.04938}, doi = {10.17705/1CAIS.04938}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cais/GermonprezGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijossp/AvandeGS20, author = {Mahugnon Olivier Avande and Robin A. Gandhi and Harvey P. Siy}, title = {Understanding User Engagement With Multi-Representational License Comprehension Interfaces}, journal = {Int. J. Open Source Softw. Process.}, volume = {11}, number = {4}, pages = {27--45}, year = {2020}, url = {https://doi.org/10.4018/IJOSSP.2020100102}, doi = {10.4018/IJOSSP.2020100102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijossp/AvandeGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/MandalGS20, author = {Sayonnha Mandal and Robin A. Gandhi and Harvey P. Siy}, title = {Modular norm models: practical representation and analysis of contractual rights and obligations}, journal = {Requir. Eng.}, volume = {25}, number = {3}, pages = {383--412}, year = {2020}, url = {https://doi.org/10.1007/s00766-019-00323-y}, doi = {10.1007/S00766-019-00323-Y}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/MandalGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/re/MandalGS20a, author = {Sayonnha Mandal and Robin A. Gandhi and Harvey P. Siy}, title = {Correction to: Modular norm models: practical representation and analysis of contractual rights and obligations}, journal = {Requir. Eng.}, volume = {25}, number = {3}, pages = {413}, year = {2020}, url = {https://doi.org/10.1007/s00766-019-00327-8}, doi = {10.1007/S00766-019-00327-8}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/re/MandalGS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/group/GandhiGL18, author = {Robin A. Gandhi and Matt Germonprez and Georg J. P. Link}, editor = {Andrea Forte and Michael Prilla and Adriana S. Vivacqua and Claudia M{\"{u}}ller and Lionel P. Robert Jr.}, title = {Open Data Standards for Open Source Software Risk Management Routines: An Examination of {SPDX}}, booktitle = {Proceedings of the 2018 {ACM} Conference on Supporting Groupwork, {GROUP} 2018, Sanibel Island, FL, USA, January 07 - 10, 2018}, pages = {219--229}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3148330.3148333}, doi = {10.1145/3148330.3148333}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/group/GandhiGL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscram/GandhiKLRS18, author = {Robin A. Gandhi and Deepak Khazanchi and Daniel G. Linzell and Brian Ricks and Chungwook Sim}, editor = {Kees Boersma and Brian M. Tomaszewski}, title = {The Hidden Crisis : Developing Smart Big Data pipelines to address Grand Challenges of Bridge Infrastructure health in the United States}, booktitle = {Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, Rochester, NY, USA, May 20-23, 2018}, publisher = {{ISCRAM} Association}, year = {2018}, url = {http://idl.iscram.org/files/robingandhi/2018/1621\_RobinGandhi\_etal2018.pdf}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscram/GandhiKLRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/MandalGS17, author = {Sayonnha Mandal and Robin A. Gandhi and Harvey P. Siy}, title = {Modular Norm Models: {A} Lightweight Approach for Modeling and Reasoning about Legal Compliance}, booktitle = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017}, pages = {657--662}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.115}, doi = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.115}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/MandalGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jossw/GermonprezGKG16, author = {Matt Germonprez and Thomas Gurney and Sai Uday Shankar Korlimarla and Robin A. Gandhi}, title = {DoSOCS: {A} System for {SPDX} 2.0 Document Creation and Storage}, journal = {J. Open Source Softw.}, volume = {1}, number = {7}, pages = {38}, year = {2016}, url = {https://doi.org/10.21105/joss.00038}, doi = {10.21105/JOSS.00038}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jossw/GermonprezGKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amia/CooperBGGHMF16, author = {Kathryn M. Cooper and Dhundy Bastola and Robin A. Gandhi and Dario Ghersi and Steven H. Hinrichs and Marsha Morien and Ann L. Fruhling}, title = {Forecasting the Spread of Mosquito-Borne Disease using Publicly Accessible Data: {A} Case Study in Chikungunya}, booktitle = {{AMIA} 2016, American Medical Informatics Association Annual Symposium, Chicago, IL, USA, November 12-16, 2016}, publisher = {{AMIA}}, year = {2016}, url = {https://knowledge.amia.org/amia-63300-1.3360278/t004-1.3364525/f004-1.3364526/2500178-1.3364953/2497497-1.3364948}, timestamp = {Wed, 17 Apr 2024 11:47:32 +0200}, biburl = {https://dblp.org/rec/conf/amia/CooperBGGHMF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/GrandgenettMG15, author = {Ryan Grandgenett and William R. Mahoney and Robin A. Gandhi}, editor = {Joseph P. Trien and Stacy J. Prowell and Robert A. Bridges and John R. Goodall}, title = {Authentication Bypass and Remote Escalated {I/O} Command Attacks}, booktitle = {Proceedings of the 10th Annual Cyber and Information Security Research Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015}, pages = {2:1--2:7}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746266.2746268}, doi = {10.1145/2746266.2746268}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/GrandgenettMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/MandalGS15, author = {Sayonnha Mandal and Robin A. Gandhi and Harvey P. Siy}, title = {Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security}, booktitle = {Eighth {IEEE} International Workshop on Requirements Engineering and Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/RELAW.2015.7330205}, doi = {10.1109/RELAW.2015.7330205}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/MandalGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/GandhiCSM14, author = {Robin A. Gandhi and Keesha Crosby and Harvey P. Siy and Sayonnha Mandal}, title = {Gauging the Impact of {FISMA} on Software Security}, journal = {Computer}, volume = {47}, number = {9}, pages = {103--107}, year = {2014}, url = {https://doi.org/10.1109/MC.2014.248}, doi = {10.1109/MC.2014.248}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/GandhiCSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SharmaGZMS13, author = {Anup C. Sharma and Robin A. Gandhi and Qiuming Zhu and William R. Mahoney and William L. Sousan}, title = {A social dimensional cyber threat model with formal concept analysis and fact-proposition inference}, journal = {Int. J. Inf. Comput. Secur.}, volume = {5}, number = {4}, pages = {301--333}, year = {2013}, url = {https://doi.org/10.1504/IJICS.2013.058213}, doi = {10.1504/IJICS.2013.058213}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SharmaGZMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/WuGS13, author = {Yan Wu and Robin A. Gandhi and Harvey P. Siy}, title = {Semi-Automatic Annotation of Natural Language Vulnerability Reports}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {18--41}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070102}, doi = {10.4018/JSSE.2013070102}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/WuGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/GandhiSW13, author = {Robin A. Gandhi and Harvey P. Siy and Yan Wu}, title = {Lightweight formal models of software weaknesses}, booktitle = {1st {FME} Workshop on Formal Methods in Software Engineering, FormaliSE 2013, San Francisco, CA, USA, May 25, 2013}, pages = {50--56}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FormaliSE.2013.6612277}, doi = {10.1109/FORMALISE.2013.6612277}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/GandhiSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inroads/MahoneyG12, author = {William R. Mahoney and Robin A. Gandhi}, title = {Reverse engineering: \emph{is it art?}}, journal = {Inroads}, volume = {3}, number = {1}, pages = {56--61}, year = {2012}, url = {https://doi.org/10.1145/2077808.2077826}, doi = {10.1145/2077808.2077826}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inroads/MahoneyG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inroads/GandhiJM12, author = {Robin A. Gandhi and Connie Jones and William R. Mahoney}, title = {A freshman level course on information assurance: can it be done? \emph{here's how}}, journal = {Inroads}, volume = {3}, number = {3}, pages = {50--61}, year = {2012}, url = {https://doi.org/10.1145/2339055.2339072}, doi = {10.1145/2339055.2339072}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inroads/GandhiJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GandhiR12, author = {Robin A. Gandhi and Mariam Rahmani}, title = {Early security patterns: {A} collection of constraints to describe regulatory security requirements}, booktitle = {Second {IEEE} International Workshop on Requirements Patterns, RePa 2012, Chicago, IL, USA, September 24, 2012}, pages = {17--22}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/RePa.2012.6359966}, doi = {10.1109/REPA.2012.6359966}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GandhiR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/MahoneyG11, author = {William R. Mahoney and Robin A. Gandhi}, title = {An integrated framework for control system simulation and regulatory compliance monitoring}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {4}, number = {1}, pages = {41--53}, year = {2011}, url = {https://doi.org/10.1016/j.ijcip.2011.03.002}, doi = {10.1016/J.IJCIP.2011.03.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/MahoneyG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tasm/GandhiSMSZL11, author = {Robin A. Gandhi and Anup C. Sharma and William R. Mahoney and William L. Sousan and Qiuming Zhu and Phillip A. Laplante}, title = {Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political}, journal = {{IEEE} Technol. Soc. Mag.}, volume = {30}, number = {1}, pages = {28--38}, year = {2011}, url = {https://doi.org/10.1109/MTS.2011.940293}, doi = {10.1109/MTS.2011.940293}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tasm/GandhiSMSZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/GandhiL11, author = {Robin A. Gandhi and Seok Won Lee}, title = {Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {20}, number = {4}, pages = {16:1--16:37}, year = {2011}, url = {https://doi.org/10.1145/2000799.2000802}, doi = {10.1145/2000799.2000802}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/GandhiL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/SousanGZM11, author = {William L. Sousan and Robin A. Gandhi and Qiuming Zhu and William R. Mahoney}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Using anomalous event patterns in control systems for tamper detection}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {26}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179326}, doi = {10.1145/2179298.2179326}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/SousanGZM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/WuSG11, author = {Yan Wu and Harvey P. Siy and Robin A. Gandhi}, editor = {Richard N. Taylor and Harald C. Gall and Nenad Medvidovic}, title = {Empirical results on the study of software vulnerabilities}, booktitle = {Proceedings of the 33rd International Conference on Software Engineering, {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011}, pages = {964--967}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1985793.1985960}, doi = {10.1145/1985793.1985960}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/WuSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/WuGS10, author = {Yan Wu and Robin A. Gandhi and Harvey P. Siy}, editor = {Seok{-}Won Lee and Mattia Monga and Jan J{\"{u}}rjens}, title = {Using semantic templates to study vulnerabilities recorded in large software repositories}, booktitle = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS} 2010, May 2, 2010, Cape Town, South Africa}, pages = {22--28}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809100.1809104}, doi = {10.1145/1809100.1809104}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/WuGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/WalenzGMZ10, author = {Brett Walenz and Robin A. Gandhi and William R. Mahoney and Qiuming Zhu}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {508--512}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.80}, doi = {10.1109/SOCIALCOM.2010.80}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/WalenzGMZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/SousanZGMS10, author = {William L. Sousan and Qiuming Zhu and Robin A. Gandhi and William R. Mahoney and Anup C. Sharma}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {967--972}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.143}, doi = {10.1109/SOCIALCOM.2010.143}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/SousanZGMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/SharmaGMSZ10, author = {Anup C. Sharma and Robin A. Gandhi and William R. Mahoney and William L. Sousan and Qiuming Zhu}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {981--986}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.145}, doi = {10.1109/SOCIALCOM.2010.145}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/SharmaGMSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/se/LeeGP10, author = {Seok Won Lee and Robin A. Gandhi and Sooyong Park}, editor = {Phillip A. Laplante}, title = {Requirements: Tracing}, booktitle = {Encyclopedia of Software Engineering}, pages = {999--1011}, publisher = {Taylor {\&} Francis}, year = {2010}, url = {http://www.crcnetbase.com/doi/abs/10.1081/E-ESE-120044209}, doi = {10.1081/E-ESE-120044209}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/se/LeeGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/LeeGW09, author = {Seok Won Lee and Robin A. Gandhi and Siddharth J. Wagle}, title = {Ontology-Guided Service-Oriented Architecture Composition to Support Complex and Tailorable Process Definitions}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {19}, number = {6}, pages = {791--821}, year = {2009}, url = {https://doi.org/10.1142/S0218194009004386}, doi = {10.1142/S0218194009004386}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/LeeGW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/refsq/GandhiL09, author = {Robin A. Gandhi and Seok Won Lee}, editor = {Martin Glinz and Patrick Heymans}, title = {Assurance Case Driven Case Study Design for Requirements Engineering Research}, booktitle = {Requirements Engineering: Foundation for Software Quality, 15th International Working Conference, {REFSQ} 2009, Amsterdam, The Netherlands, June 8-9, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5512}, pages = {190--196}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02050-6\_16}, doi = {10.1007/978-3-642-02050-6\_16}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/refsq/GandhiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/sci/GandhiL09, author = {Robin A. Gandhi and Seok Won Lee}, editor = {Zbigniew W. Ras and William Ribarsky}, title = {Ontology Guided Risk Analysis: From Informal Specifications to Formal Metrics}, booktitle = {Advances in Information and Intelligent Systems}, series = {Studies in Computational Intelligence}, volume = {251}, pages = {227--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04141-9\_11}, doi = {10.1007/978-3-642-04141-9\_11}, timestamp = {Tue, 16 May 2017 14:24:36 +0200}, biburl = {https://dblp.org/rec/series/sci/GandhiL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sopr/LeeGA07, author = {Seok Won Lee and Robin A. Gandhi and Gail{-}Joon Ahn}, title = {Certification process artifacts defined as measurable units for software assurance}, journal = {Softw. Process. Improv. Pract.}, volume = {12}, number = {2}, pages = {165--189}, year = {2007}, url = {https://doi.org/10.1002/spip.313}, doi = {10.1002/SPIP.313}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sopr/LeeGA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LeeGW07, author = {Seok Won Lee and Robin A. Gandhi and Siddharth J. Wagle}, title = {Towards a Requirements-Driven Workbench for Supporting Software Certification and Accreditation}, booktitle = {Third International Workshop on Software Engineering for Secure Systems, {SESS} 2007, Minneapolis, MN, USA, May 20-26, 2007}, pages = {8}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SESS.2007.11}, doi = {10.1109/SESS.2007.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/LeeGW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/GandhiL07, author = {Robin A. Gandhi and Seok Won Lee}, title = {Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment}, booktitle = {15th {IEEE} International Requirements Engineering Conference, {RE} 2007, October 15-19th, 2007, New Delhi, India}, pages = {231--240}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/RE.2007.46}, doi = {10.1109/RE.2007.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/GandhiL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/LeeGWM07, author = {Seok Won Lee and Robin A. Gandhi and Siddharth J. Wagle and Ajeet B. Murty}, title = {r-AnalytiCA: Requirements Analytics for Certification {\&} Accreditation}, booktitle = {15th {IEEE} International Requirements Engineering Conference, {RE} 2007, October 15-19th, 2007, New Delhi, India}, pages = {383--384}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/RE.2007.34}, doi = {10.1109/RE.2007.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/LeeGWM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/LeeMGYA06, author = {Seok Won Lee and Divya Muthurajan and Robin A. Gandhi and Deepak S. Yavagal and Gail{-}Joon Ahn}, title = {Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {16}, number = {6}, pages = {851--884}, year = {2006}, url = {https://doi.org/10.1142/S0218194006003051}, doi = {10.1142/S0218194006003051}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/LeeMGYA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LeeGMYA06, author = {Seok Won Lee and Robin A. Gandhi and Divya Muthurajan and Deepak S. Yavagal and Gail{-}Joon Ahn}, editor = {Danilo Bruschi and Bart De Win and Mattia Monga}, title = {Building problem domain ontology from security requirements in regulatory documents}, booktitle = {Proceedings of the 2006 international workshop on Software engineering for secure systems, {SESS} 2006, Shanghai, China, May 20-21, 2006}, pages = {43--50}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1137627.1137635}, doi = {10.1145/1137627.1137635}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/LeeGMYA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/RichterGLL06, author = {Heather Richter and Robin A. Gandhi and Lei Liu and Seok Won Lee}, editor = {Oliver Creighton and Bernd Bruegge}, title = {Incorporating Multimedia Source Materials into a Traceability Framework}, booktitle = {2006 First International Workshop on Multimedia Requirements Engineering, {MERE} 2006, Minnneapolis, MN, USA, September 12, 2006}, pages = {7}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MERE.2006.3}, doi = {10.1109/MERE.2006.3}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/RichterGLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigsoft/LeeGA05, author = {Seok Won Lee and Robin A. Gandhi and Gail{-}Joon Ahn}, title = {Establishing trustworthiness in services of the critical infrastructure through certification and accreditation}, journal = {{ACM} {SIGSOFT} Softw. Eng. Notes}, volume = {30}, number = {4}, pages = {1--7}, year = {2005}, url = {https://doi.org/10.1145/1082983.1083205}, doi = {10.1145/1082983.1083205}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigsoft/LeeGA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/YavagalLAG05, author = {Deepak S. Yavagal and Seok Won Lee and Gail{-}Joon Ahn and Robin A. Gandhi}, editor = {M{\'{a}}rio Guimar{\~{a}}es}, title = {Common criteria requirements modeling and its uses for quality of information assurance (QoIA)}, booktitle = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2}, pages = {130--135}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1167253.1167287}, doi = {10.1145/1167253.1167287}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ACMse/YavagalLAG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apsec/LeeG05, author = {Seok Won Lee and Robin A. Gandhi}, title = {Ontology-based Active Requirements Engineering Framework}, booktitle = {12th Asia-Pacific Software Engineering Conference {(APSEC} 2005), 15-17 December 2005, Taipei, Taiwan}, pages = {481--490}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/APSEC.2005.86}, doi = {10.1109/APSEC.2005.86}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apsec/LeeG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LeeGA05, author = {Seok Won Lee and Robin A. Gandhi and Gail{-}Joon Ahn}, title = {Establishing trustworthiness in services of the critical infrastructure through certification and accreditation}, booktitle = {Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis, Missouri, USA, May 15-16, 2005}, pages = {1--7}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1083200.1083205}, doi = {10.1145/1083200.1083205}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/LeeGA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/LeeGAY05, author = {Seok Won Lee and Robin A. Gandhi and Gail{-}Joon Ahn and Deepak S. Yavagal}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {Active Automation of the {DITSCAP}}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {479--485}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_46}, doi = {10.1007/11427995\_46}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/LeeGAY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smc/ToloneGA03, author = {William J. Tolone and Robin A. Gandhi and Gail{-}Joon Ahn}, title = {Locale-based access control: placing collaborative authorization decisions in context}, booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003}, pages = {4120--4127}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICSMC.2003.1245632}, doi = {10.1109/ICSMC.2003.1245632}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/ToloneGA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.