


default search action
International Journal of Secure Software Engineering, Volume 6
Volume 6, Number 1, 2015
- Nancy R. Mead, Jose Andre Morales

, Gregory Paul Alice:
A Method and Case Study for Using Malware Analysis to Improve Security Requirements. 1-23 - Azadeh Alebrahim, Denis Hatebur, Stephan Faßbender, Ludger Goeke, Isabelle Côté:

A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems. 24-46 - Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, Christian Kreiner:

Balancing Product and Process Assurance for Evolving Security Systems. 47-75
Volume 6, Number 2, 2015
- Richard Gay, Heiko Mantel, Henning Sudbrock:

An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels. 1-22 - Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh

:
Calculating Quantitative Integrity and Secrecy for Imperative Programs. 23-46 - Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin

:
Using Attack Graphs to Analyze Social Engineering Threats. 47-69 - Alessandro Armando, Michele Bezzi, Nadia Metoui

, Antonino Sabetta:
Risk-Based Privacy-Aware Information Disclosure. 70-89 - Gencer Erdogan, Fredrik Seehusen, Ketil Stølen, Jon Hofstad, Jan Øyvind Aagedal:

Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies. 90-112
Volume 6, Number 3, 2015
- Hossain Shahriar, Hisham M. Haddad, Vamshee Krishna Devendran:

Request and Response Analysis Framework for Mitigating Clickjacking Attacks. 1-25 - Seiji Munetoh

, Nobukazu Yoshioka:
Method Using Command Abstraction Library for Iterative Testing Security of Web Applications. 26-49 - Bouchaib Falah, Mohammed Akour, Samia Oukemeni:

An Alternative Threat Model-based Approach for Security Testing. 50-64
Volume 6, Number 4, 2015
- Mohamed El-Attar:

Supporting Consistency during the Development and Evolution of Quality Unified Use-Misuse Case Models. 1-31 - Neila Rjaibi, Latifa Ben Arfa Rabai

:
Expansion and Practical Implementation of the MFC Cybersecurity Model via a Novel Security Requirements Taxonomy. 32-51 - Mehdi Dadkhah, Shahaboddin Shamshirband:

An Introduction to Remote Installation Vulnerability in Content Management Systems. 52-63

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














