BibTeX records: Robin A. Gandhi

download as .bib file

@article{DBLP:journals/cais/GermonprezGL21,
  author       = {Matt Germonprez and
                  Robin A. Gandhi and
                  Georg J. P. Link},
  title        = {The Routinization of Open Source Project Engagement: The Case of Open
                  Source Risk Management Routines},
  journal      = {Commun. Assoc. Inf. Syst.},
  volume       = {49},
  pages        = {39},
  year         = {2021},
  url          = {https://doi.org/10.17705/1cais.04938},
  doi          = {10.17705/1CAIS.04938},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cais/GermonprezGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijossp/AvandeGS20,
  author       = {Mahugnon Olivier Avande and
                  Robin A. Gandhi and
                  Harvey P. Siy},
  title        = {Understanding User Engagement With Multi-Representational License
                  Comprehension Interfaces},
  journal      = {Int. J. Open Source Softw. Process.},
  volume       = {11},
  number       = {4},
  pages        = {27--45},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJOSSP.2020100102},
  doi          = {10.4018/IJOSSP.2020100102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijossp/AvandeGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/MandalGS20,
  author       = {Sayonnha Mandal and
                  Robin A. Gandhi and
                  Harvey P. Siy},
  title        = {Modular norm models: practical representation and analysis of contractual
                  rights and obligations},
  journal      = {Requir. Eng.},
  volume       = {25},
  number       = {3},
  pages        = {383--412},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00766-019-00323-y},
  doi          = {10.1007/S00766-019-00323-Y},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/MandalGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/re/MandalGS20a,
  author       = {Sayonnha Mandal and
                  Robin A. Gandhi and
                  Harvey P. Siy},
  title        = {Correction to: Modular norm models: practical representation and analysis
                  of contractual rights and obligations},
  journal      = {Requir. Eng.},
  volume       = {25},
  number       = {3},
  pages        = {413},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00766-019-00327-8},
  doi          = {10.1007/S00766-019-00327-8},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/re/MandalGS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/group/GandhiGL18,
  author       = {Robin A. Gandhi and
                  Matt Germonprez and
                  Georg J. P. Link},
  editor       = {Andrea Forte and
                  Michael Prilla and
                  Adriana S. Vivacqua and
                  Claudia M{\"{u}}ller and
                  Lionel P. Robert Jr.},
  title        = {Open Data Standards for Open Source Software Risk Management Routines:
                  An Examination of {SPDX}},
  booktitle    = {Proceedings of the 2018 {ACM} Conference on Supporting Groupwork,
                  {GROUP} 2018, Sanibel Island, FL, USA, January 07 - 10, 2018},
  pages        = {219--229},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3148330.3148333},
  doi          = {10.1145/3148330.3148333},
  timestamp    = {Tue, 11 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/group/GandhiGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscram/GandhiKLRS18,
  author       = {Robin A. Gandhi and
                  Deepak Khazanchi and
                  Daniel G. Linzell and
                  Brian Ricks and
                  Chungwook Sim},
  editor       = {Kees Boersma and
                  Brian M. Tomaszewski},
  title        = {The Hidden Crisis : Developing Smart Big Data pipelines to address
                  Grand Challenges of Bridge Infrastructure health in the United States},
  booktitle    = {Proceedings of the 15th International Conference on Information Systems
                  for Crisis Response and Management, Rochester, NY, USA, May 20-23,
                  2018},
  publisher    = {{ISCRAM} Association},
  year         = {2018},
  url          = {http://idl.iscram.org/files/robingandhi/2018/1621\_RobinGandhi\_etal2018.pdf},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscram/GandhiKLRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/MandalGS17,
  author       = {Sayonnha Mandal and
                  Robin A. Gandhi and
                  Harvey P. Siy},
  title        = {Modular Norm Models: {A} Lightweight Approach for Modeling and Reasoning
                  about Legal Compliance},
  booktitle    = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
                  15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf
                  on Big Data Intelligence and Computing and Cyber Science and Technology
                  Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA,
                  November 6-10, 2017},
  pages        = {657--662},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.115},
  doi          = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.115},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/MandalGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossw/GermonprezGKG16,
  author       = {Matt Germonprez and
                  Thomas Gurney and
                  Sai Uday Shankar Korlimarla and
                  Robin A. Gandhi},
  title        = {DoSOCS: {A} System for {SPDX} 2.0 Document Creation and Storage},
  journal      = {J. Open Source Softw.},
  volume       = {1},
  number       = {7},
  pages        = {38},
  year         = {2016},
  url          = {https://doi.org/10.21105/joss.00038},
  doi          = {10.21105/JOSS.00038},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossw/GermonprezGKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/CooperBGGHMF16,
  author       = {Kathryn M. Cooper and
                  Dhundy Bastola and
                  Robin A. Gandhi and
                  Dario Ghersi and
                  Steven H. Hinrichs and
                  Marsha Morien and
                  Ann L. Fruhling},
  title        = {Forecasting the Spread of Mosquito-Borne Disease using Publicly Accessible
                  Data: {A} Case Study in Chikungunya},
  booktitle    = {{AMIA} 2016, American Medical Informatics Association Annual Symposium,
                  Chicago, IL, USA, November 12-16, 2016},
  publisher    = {{AMIA}},
  year         = {2016},
  url          = {https://knowledge.amia.org/amia-63300-1.3360278/t004-1.3364525/f004-1.3364526/2500178-1.3364953/2497497-1.3364948},
  timestamp    = {Wed, 17 Apr 2024 11:47:32 +0200},
  biburl       = {https://dblp.org/rec/conf/amia/CooperBGGHMF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GrandgenettMG15,
  author       = {Ryan Grandgenett and
                  William R. Mahoney and
                  Robin A. Gandhi},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  Robert A. Bridges and
                  John R. Goodall},
  title        = {Authentication Bypass and Remote Escalated {I/O} Command Attacks},
  booktitle    = {Proceedings of the 10th Annual Cyber and Information Security Research
                  Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  pages        = {2:1--2:7},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746266.2746268},
  doi          = {10.1145/2746266.2746268},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/GrandgenettMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/MandalGS15,
  author       = {Sayonnha Mandal and
                  Robin A. Gandhi and
                  Harvey P. Siy},
  title        = {Semantic web representations for reasoning about applicability and
                  satisfiability of federal regulations for information security},
  booktitle    = {Eighth {IEEE} International Workshop on Requirements Engineering and
                  Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/RELAW.2015.7330205},
  doi          = {10.1109/RELAW.2015.7330205},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/MandalGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GandhiCSM14,
  author       = {Robin A. Gandhi and
                  Keesha Crosby and
                  Harvey P. Siy and
                  Sayonnha Mandal},
  title        = {Gauging the Impact of {FISMA} on Software Security},
  journal      = {Computer},
  volume       = {47},
  number       = {9},
  pages        = {103--107},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.248},
  doi          = {10.1109/MC.2014.248},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/GandhiCSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SharmaGZMS13,
  author       = {Anup C. Sharma and
                  Robin A. Gandhi and
                  Qiuming Zhu and
                  William R. Mahoney and
                  William L. Sousan},
  title        = {A social dimensional cyber threat model with formal concept analysis
                  and fact-proposition inference},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {301--333},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJICS.2013.058213},
  doi          = {10.1504/IJICS.2013.058213},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SharmaGZMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/WuGS13,
  author       = {Yan Wu and
                  Robin A. Gandhi and
                  Harvey P. Siy},
  title        = {Semi-Automatic Annotation of Natural Language Vulnerability Reports},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {18--41},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013070102},
  doi          = {10.4018/JSSE.2013070102},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsse/WuGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GandhiSW13,
  author       = {Robin A. Gandhi and
                  Harvey P. Siy and
                  Yan Wu},
  title        = {Lightweight formal models of software weaknesses},
  booktitle    = {1st {FME} Workshop on Formal Methods in Software Engineering, FormaliSE
                  2013, San Francisco, CA, USA, May 25, 2013},
  pages        = {50--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FormaliSE.2013.6612277},
  doi          = {10.1109/FORMALISE.2013.6612277},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/GandhiSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inroads/MahoneyG12,
  author       = {William R. Mahoney and
                  Robin A. Gandhi},
  title        = {Reverse engineering: \emph{is it art?}},
  journal      = {Inroads},
  volume       = {3},
  number       = {1},
  pages        = {56--61},
  year         = {2012},
  url          = {https://doi.org/10.1145/2077808.2077826},
  doi          = {10.1145/2077808.2077826},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inroads/MahoneyG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inroads/GandhiJM12,
  author       = {Robin A. Gandhi and
                  Connie Jones and
                  William R. Mahoney},
  title        = {A freshman level course on information assurance: can it be done?
                  \emph{here's how}},
  journal      = {Inroads},
  volume       = {3},
  number       = {3},
  pages        = {50--61},
  year         = {2012},
  url          = {https://doi.org/10.1145/2339055.2339072},
  doi          = {10.1145/2339055.2339072},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inroads/GandhiJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GandhiR12,
  author       = {Robin A. Gandhi and
                  Mariam Rahmani},
  title        = {Early security patterns: {A} collection of constraints to describe
                  regulatory security requirements},
  booktitle    = {Second {IEEE} International Workshop on Requirements Patterns, RePa
                  2012, Chicago, IL, USA, September 24, 2012},
  pages        = {17--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/RePa.2012.6359966},
  doi          = {10.1109/REPA.2012.6359966},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GandhiR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MahoneyG11,
  author       = {William R. Mahoney and
                  Robin A. Gandhi},
  title        = {An integrated framework for control system simulation and regulatory
                  compliance monitoring},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {4},
  number       = {1},
  pages        = {41--53},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ijcip.2011.03.002},
  doi          = {10.1016/J.IJCIP.2011.03.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/MahoneyG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tasm/GandhiSMSZL11,
  author       = {Robin A. Gandhi and
                  Anup C. Sharma and
                  William R. Mahoney and
                  William L. Sousan and
                  Qiuming Zhu and
                  Phillip A. Laplante},
  title        = {Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political},
  journal      = {{IEEE} Technol. Soc. Mag.},
  volume       = {30},
  number       = {1},
  pages        = {28--38},
  year         = {2011},
  url          = {https://doi.org/10.1109/MTS.2011.940293},
  doi          = {10.1109/MTS.2011.940293},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tasm/GandhiSMSZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/GandhiL11,
  author       = {Robin A. Gandhi and
                  Seok Won Lee},
  title        = {Discovering Multidimensional Correlations among Regulatory Requirements
                  to Understand Risk},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {20},
  number       = {4},
  pages        = {16:1--16:37},
  year         = {2011},
  url          = {https://doi.org/10.1145/2000799.2000802},
  doi          = {10.1145/2000799.2000802},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosem/GandhiL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SousanGZM11,
  author       = {William L. Sousan and
                  Robin A. Gandhi and
                  Qiuming Zhu and
                  William R. Mahoney},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Using anomalous event patterns in control systems for tamper detection},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {26},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179326},
  doi          = {10.1145/2179298.2179326},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/SousanGZM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WuSG11,
  author       = {Yan Wu and
                  Harvey P. Siy and
                  Robin A. Gandhi},
  editor       = {Richard N. Taylor and
                  Harald C. Gall and
                  Nenad Medvidovic},
  title        = {Empirical results on the study of software vulnerabilities},
  booktitle    = {Proceedings of the 33rd International Conference on Software Engineering,
                  {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011},
  pages        = {964--967},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1985793.1985960},
  doi          = {10.1145/1985793.1985960},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/WuSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WuGS10,
  author       = {Yan Wu and
                  Robin A. Gandhi and
                  Harvey P. Siy},
  editor       = {Seok{-}Won Lee and
                  Mattia Monga and
                  Jan J{\"{u}}rjens},
  title        = {Using semantic templates to study vulnerabilities recorded in large
                  software repositories},
  booktitle    = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
                  2010, May 2, 2010, Cape Town, South Africa},
  pages        = {22--28},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809100.1809104},
  doi          = {10.1145/1809100.1809104},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/WuGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/WalenzGMZ10,
  author       = {Brett Walenz and
                  Robin A. Gandhi and
                  William R. Mahoney and
                  Qiuming Zhu},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Exploring Social Contexts along the Time Dimension: Temporal Analysis
                  of Named Entities},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {508--512},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.80},
  doi          = {10.1109/SOCIALCOM.2010.80},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/WalenzGMZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/SousanZGMS10,
  author       = {William L. Sousan and
                  Qiuming Zhu and
                  Robin A. Gandhi and
                  William R. Mahoney and
                  Anup C. Sharma},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Using Term Extraction Patterns to Discover Coherent Relationships
                  from Open Source Intelligence},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {967--972},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.143},
  doi          = {10.1109/SOCIALCOM.2010.143},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/SousanZGMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/SharmaGMSZ10,
  author       = {Anup C. Sharma and
                  Robin A. Gandhi and
                  William R. Mahoney and
                  William L. Sousan and
                  Qiuming Zhu},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Building a Social Dimensional Threat Model from Current and Historic
                  Events of Cyber Attacks},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {981--986},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.145},
  doi          = {10.1109/SOCIALCOM.2010.145},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/SharmaGMSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/se/LeeGP10,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Sooyong Park},
  editor       = {Phillip A. Laplante},
  title        = {Requirements: Tracing},
  booktitle    = {Encyclopedia of Software Engineering},
  pages        = {999--1011},
  publisher    = {Taylor {\&} Francis},
  year         = {2010},
  url          = {http://www.crcnetbase.com/doi/abs/10.1081/E-ESE-120044209},
  doi          = {10.1081/E-ESE-120044209},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/se/LeeGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/LeeGW09,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Siddharth J. Wagle},
  title        = {Ontology-Guided Service-Oriented Architecture Composition to Support
                  Complex and Tailorable Process Definitions},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {19},
  number       = {6},
  pages        = {791--821},
  year         = {2009},
  url          = {https://doi.org/10.1142/S0218194009004386},
  doi          = {10.1142/S0218194009004386},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/LeeGW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/GandhiL09,
  author       = {Robin A. Gandhi and
                  Seok Won Lee},
  editor       = {Martin Glinz and
                  Patrick Heymans},
  title        = {Assurance Case Driven Case Study Design for Requirements Engineering
                  Research},
  booktitle    = {Requirements Engineering: Foundation for Software Quality, 15th International
                  Working Conference, {REFSQ} 2009, Amsterdam, The Netherlands, June
                  8-9, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5512},
  pages        = {190--196},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02050-6\_16},
  doi          = {10.1007/978-3-642-02050-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/refsq/GandhiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/GandhiL09,
  author       = {Robin A. Gandhi and
                  Seok Won Lee},
  editor       = {Zbigniew W. Ras and
                  William Ribarsky},
  title        = {Ontology Guided Risk Analysis: From Informal Specifications to Formal
                  Metrics},
  booktitle    = {Advances in Information and Intelligent Systems},
  series       = {Studies in Computational Intelligence},
  volume       = {251},
  pages        = {227--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04141-9\_11},
  doi          = {10.1007/978-3-642-04141-9\_11},
  timestamp    = {Tue, 16 May 2017 14:24:36 +0200},
  biburl       = {https://dblp.org/rec/series/sci/GandhiL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sopr/LeeGA07,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn},
  title        = {Certification process artifacts defined as measurable units for software
                  assurance},
  journal      = {Softw. Process. Improv. Pract.},
  volume       = {12},
  number       = {2},
  pages        = {165--189},
  year         = {2007},
  url          = {https://doi.org/10.1002/spip.313},
  doi          = {10.1002/SPIP.313},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sopr/LeeGA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGW07,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Siddharth J. Wagle},
  title        = {Towards a Requirements-Driven Workbench for Supporting Software Certification
                  and Accreditation},
  booktitle    = {Third International Workshop on Software Engineering for Secure Systems,
                  {SESS} 2007, Minneapolis, MN, USA, May 20-26, 2007},
  pages        = {8},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SESS.2007.11},
  doi          = {10.1109/SESS.2007.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/LeeGW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GandhiL07,
  author       = {Robin A. Gandhi and
                  Seok Won Lee},
  title        = {Discovering and Understanding Multi-dimensional Correlations among
                  Certification Requirements with application to Risk Assessment},
  booktitle    = {15th {IEEE} International Requirements Engineering Conference, {RE}
                  2007, October 15-19th, 2007, New Delhi, India},
  pages        = {231--240},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/RE.2007.46},
  doi          = {10.1109/RE.2007.46},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/GandhiL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/LeeGWM07,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Siddharth J. Wagle and
                  Ajeet B. Murty},
  title        = {r-AnalytiCA: Requirements Analytics for Certification {\&} Accreditation},
  booktitle    = {15th {IEEE} International Requirements Engineering Conference, {RE}
                  2007, October 15-19th, 2007, New Delhi, India},
  pages        = {383--384},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/RE.2007.34},
  doi          = {10.1109/RE.2007.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/LeeGWM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/LeeMGYA06,
  author       = {Seok Won Lee and
                  Divya Muthurajan and
                  Robin A. Gandhi and
                  Deepak S. Yavagal and
                  Gail{-}Joon Ahn},
  title        = {Building Decision Support Problem Domain Ontology from Natural Language
                  Requirements for Software Assurance},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {16},
  number       = {6},
  pages        = {851--884},
  year         = {2006},
  url          = {https://doi.org/10.1142/S0218194006003051},
  doi          = {10.1142/S0218194006003051},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijseke/LeeMGYA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGMYA06,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Divya Muthurajan and
                  Deepak S. Yavagal and
                  Gail{-}Joon Ahn},
  editor       = {Danilo Bruschi and
                  Bart De Win and
                  Mattia Monga},
  title        = {Building problem domain ontology from security requirements in regulatory
                  documents},
  booktitle    = {Proceedings of the 2006 international workshop on Software engineering
                  for secure systems, {SESS} 2006, Shanghai, China, May 20-21, 2006},
  pages        = {43--50},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1137627.1137635},
  doi          = {10.1145/1137627.1137635},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/LeeGMYA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/RichterGLL06,
  author       = {Heather Richter and
                  Robin A. Gandhi and
                  Lei Liu and
                  Seok Won Lee},
  editor       = {Oliver Creighton and
                  Bernd Bruegge},
  title        = {Incorporating Multimedia Source Materials into a Traceability Framework},
  booktitle    = {2006 First International Workshop on Multimedia Requirements Engineering,
                  {MERE} 2006, Minnneapolis, MN, USA, September 12, 2006},
  pages        = {7},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/MERE.2006.3},
  doi          = {10.1109/MERE.2006.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/re/RichterGLL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/LeeGA05,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn},
  title        = {Establishing trustworthiness in services of the critical infrastructure
                  through certification and accreditation},
  journal      = {{ACM} {SIGSOFT} Softw. Eng. Notes},
  volume       = {30},
  number       = {4},
  pages        = {1--7},
  year         = {2005},
  url          = {https://doi.org/10.1145/1082983.1083205},
  doi          = {10.1145/1082983.1083205},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigsoft/LeeGA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/YavagalLAG05,
  author       = {Deepak S. Yavagal and
                  Seok Won Lee and
                  Gail{-}Joon Ahn and
                  Robin A. Gandhi},
  editor       = {M{\'{a}}rio Guimar{\~{a}}es},
  title        = {Common criteria requirements modeling and its uses for quality of
                  information assurance (QoIA)},
  booktitle    = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005,
                  Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2},
  pages        = {130--135},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1167253.1167287},
  doi          = {10.1145/1167253.1167287},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ACMse/YavagalLAG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/LeeG05,
  author       = {Seok Won Lee and
                  Robin A. Gandhi},
  title        = {Ontology-based Active Requirements Engineering Framework},
  booktitle    = {12th Asia-Pacific Software Engineering Conference {(APSEC} 2005),
                  15-17 December 2005, Taipei, Taiwan},
  pages        = {481--490},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/APSEC.2005.86},
  doi          = {10.1109/APSEC.2005.86},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apsec/LeeG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGA05,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn},
  title        = {Establishing trustworthiness in services of the critical infrastructure
                  through certification and accreditation},
  booktitle    = {Proceedings of the 2005 Workshop on Software Engineering for Secure
                  Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis,
                  Missouri, USA, May 15-16, 2005},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1083200.1083205},
  doi          = {10.1145/1083200.1083205},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/LeeGA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeeGAY05,
  author       = {Seok Won Lee and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn and
                  Deepak S. Yavagal},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {Active Automation of the {DITSCAP}},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {479--485},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_46},
  doi          = {10.1007/11427995\_46},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/LeeGAY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/ToloneGA03,
  author       = {William J. Tolone and
                  Robin A. Gandhi and
                  Gail{-}Joon Ahn},
  title        = {Locale-based access control: placing collaborative authorization decisions
                  in context},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  pages        = {4120--4127},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICSMC.2003.1245632},
  doi          = {10.1109/ICSMC.2003.1245632},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/ToloneGA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics