


default search action
International Journal of Secure Software Engineering, Volume 4
Volume 4, Number 1, 2013
- Nancy R. Mead, Daniel Shoemaker, Carol Woody:

Principles and Measurement Models for Software Assurance. 1-10 - Simon Miller, Susan Appleby, Jonathan M. Garibaldi, Uwe Aickelin

:
Towards a More Systematic Approach to Secure Systems Design and Analysis. 11-30 - Yutaka Matsuno, Shuichiro Yamamoto:

A New Method for Writing Assurance Cases. 31-49 - Reza Alavi, Shareeful Islam, Hamid Jahankhani, Ameer Al-Nemrat:

Analyzing Human Factors for an Effective Information Security Management System. 50-74 - Eric D. Vugrin, Jennifer Turgeon:

Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessments. 75-96
Volume 4, Number 2, 2013
- Per Håkon Meland, Erlend Andreas Gjære:

Threat Representation Methods for Composite Service Process Models. 1-18 - Jean Dubreuil, Guillaume Bouffard

, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Mitigating Type Confusion on Java Card. 19-39 - Horia V. Corcalciuc:

A Taxonomy Built on Layers of Abstraction for Time and State Vulnerabilities. 40-66
Volume 4, Number 3, 2013
- Jeff Crawford:

Assessing the Value of Formal Control Mechanisms on Strong Password Selection. 1-17 - Yan Wu, Robin A. Gandhi, Harvey P. Siy

:
Semi-Automatic Annotation of Natural Language Vulnerability Reports. 18-41 - Haruhiko Kaiya, Junya Sakai, Shinpei Ogata, Kenji Kaijiri:

Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment. 42-63 - Neila Rjaibi, Latifa Ben Arfa Rabai

, Anis Ben Aissa, Ali Mili:
Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study. 64-81
Volume 4, Number 4, 2013
- Pal-Stefan Murvay, Bogdan Groza:

Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms. 1-24 - Li Wang, Zheng Li, Shangping Ren, Kevin A. Kwiat:

Optimal Voting Strategy against Random and Targeted Attacks. 25-46 - Filipe Caldeira

, Thomas Schaberreiter, Sébastien Varrette
, Edmundo Monteiro, Paulo Simões
, Pascal Bouvry
, Djamel Khadraoui:
Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures. 47-69

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














