


Остановите войну!
for scientists:
Search dblp for Publications
export results for "stream:streams/journals/ijsse:"
@article{DBLP:journals/ijsse/BeheraB17, author = {Chandan Kumar Behera and D. Lalitha Bhaskari}, title = {Self-Modifying Code: {A} Provable Technique for Enhancing Program Obfuscation}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {3}, pages = {24--41}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017070102}, doi = {10.4018/IJSSE.2017070102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BeheraB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BoldtJBC17, author = {Martin Boldt and Andreas Jacobsson and Dejan Baca and Bengt Carlsson}, title = {Introducing a Novel Security-Enhanced Agile Software Development Process}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {2}, pages = {26--52}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017040102}, doi = {10.4018/IJSSE.2017040102}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/BoldtJBC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/JimenezOR17, author = {Lina M. Jimenez and Mart{\'{\i}}n Ochoa and Sandra Julieta Rueda}, title = {Jif-Based Verification of Information Flow Policies for Android Apps}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {1}, pages = {28--42}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017010102}, doi = {10.4018/IJSSE.2017010102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/JimenezOR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KalloniatisPKG17, author = {Christos Kalloniatis and Argyri Pattakou and Evangelia Kavakli and Stefanos Gritzalis}, title = {Designing Secure and Privacy-Aware Information Systems}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {2}, pages = {1--25}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017040101}, doi = {10.4018/IJSSE.2017040101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KalloniatisPKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MisraADM17, author = {Sanjay Misra and Adewole Adewumi and Robertas Damasevicius and Rytis Maskeliunas}, title = {Analysis of Existing Software Cognitive Complexity Measures}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {4}, pages = {51--71}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017100103}, doi = {10.4018/IJSSE.2017100103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MisraADM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/OyetoyanJC17, author = {Tosin Daniel Oyetoyan and Martin Gilje Jaatun and Daniela Soares Cruzes}, title = {A Lightweight Measurement of Software Security Skills, Usage and Training Needs in Agile Teams}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {1}, pages = {1--27}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017010101}, doi = {10.4018/IJSSE.2017010101}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/OyetoyanJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ReisA17, author = {Sofia Reis and Rui Abreu}, title = {A Database of Existing Vulnerabilities to Enable Controlled Testing Studies}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {3}, pages = {1--23}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017070101}, doi = {10.4018/IJSSE.2017070101}, timestamp = {Tue, 13 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ReisA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/RindellHL17, author = {Kalle Rindell and Sami Hyrynsalmi and Ville Lepp{\"{a}}nen}, title = {Case Study of Agile Security Engineering: Building Identity Management for a Government Agency}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {1}, pages = {43--57}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017010103}, doi = {10.4018/IJSSE.2017010103}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/RindellHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ShahriarHB17, author = {Hossain Shahriar and Hisham Haddad and Pranahita Bulusu}, title = {{LDAP} Vulnerability Detection in Web Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {4}, pages = {31--50}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017100102}, doi = {10.4018/IJSSE.2017100102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ShahriarHB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/TondelJCM17, author = {Inger Anne T{\o}ndel and Martin Gilje Jaatun and Daniela Soares Cruzes and Nils Brede Moe}, title = {Risk Centric Activities in Secure Software Development in Public Organisations}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {4}, pages = {1--30}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017100101}, doi = {10.4018/IJSSE.2017100101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/TondelJCM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/YuKYHWXF17, author = {Yijun Yu and Haruhiko Kaiya and Nobukazu Yoshioka and Zhenjiang Hu and Hironori Washizaki and Yingfei Xiong and Amin Hosseinian Far}, title = {Goal Modelling for Security Problem Matching and Pattern Enforcement}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {3}, pages = {42--57}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017070103}, doi = {10.4018/IJSSE.2017070103}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/YuKYHWXF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/YuLR17, author = {Liguo Yu and Yingmei Li and Srini Ramaswamy}, title = {Design Patterns and Design Quality: Theoretical Analysis, Empirical Study, and User Experience}, journal = {Int. J. Secur. Softw. Eng.}, volume = {8}, number = {2}, pages = {53--81}, year = {2017}, url = {https://doi.org/10.4018/IJSSE.2017040103}, doi = {10.4018/IJSSE.2017040103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/YuLR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Al-HadhramiAO16, author = {Nasser Al{-}Hadhrami and Benjamin Aziz and Lotfi Ben Othmane}, title = {An Incremental B-Model for RBAC-Controlled Electronic Marking System}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {2}, pages = {37--64}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016040103}, doi = {10.4018/IJSSE.2016040103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Al-HadhramiAO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ArogundadeAJY16, author = {Oluwasefunmi 'Tale Arogundade and Olusola John Adeniran and Zhi Jin and Xiaoguang Yang}, title = {Towards Ontological Approach to Security Risk Analysis of Information System: Model and Architecture}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {3}, pages = {1--25}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016070101}, doi = {10.4018/IJSSE.2016070101}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/ArogundadeAJY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/IslamFWK16, author = {Shareeful Islam and Stefan Fenz and Edgar R. Weippl and Christos Kalloniatis}, title = {Migration Goals and Risk Management in Cloud Computing: {A} Review of State of the Art and Survey Results on Practitioners}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {3}, pages = {44--73}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016070103}, doi = {10.4018/IJSSE.2016070103}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/IslamFWK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Omoronyia16, author = {Inah Omoronyia}, title = {The Case for Privacy Awareness Requirements}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {2}, pages = {19--36}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016040102}, doi = {10.4018/IJSSE.2016040102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Omoronyia16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/OueslatiROGA16, author = {Hela Oueslati and Mohammad Masudur Rahman and Lotfi Ben Othmane and Imran Ghani and Adila Firdaus Bt Arbain}, title = {Evaluation of the Challenges of Developing Secure Software Using the Agile Approach}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {1}, pages = {17--37}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016010102}, doi = {10.4018/IJSSE.2016010102}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/OueslatiROGA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/PietikainenKR16, author = {Pekka Pietik{\"{a}}inen and Atte Kettunen and Juha R{\"{o}}ning}, title = {Steps Towards Fuzz Testing in Agile Test Automation}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {1}, pages = {38--52}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016010103}, doi = {10.4018/IJSSE.2016010103}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/PietikainenKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/PondeS16, author = {Poonam Ponde and Shailaja Shirwaikar}, title = {An Exploratory Study of the Security Design Pattern Landscape and their Classification}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {3}, pages = {26--43}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016070102}, doi = {10.4018/IJSSE.2016070102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/PondeS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ShahriarH16, author = {Hossain Shahriar and Hisham Haddad}, title = {Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {2}, pages = {1--18}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016040101}, doi = {10.4018/IJSSE.2016040101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ShahriarH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ShahriarHLL16, author = {Hossain Shahriar and Hisham M. Haddad and David Lebron and Rubana Yasmin Lupu}, title = {Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {4}, pages = {1--18}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016100101}, doi = {10.4018/IJSSE.2016100101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ShahriarHLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SharmaSS16, author = {Ruchi Sharma and Ritu Sibal and Avinash K. Shrivastava}, title = {Vulnerability Discovery Modeling for Open and Closed Source Software}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {4}, pages = {19--38}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016100102}, doi = {10.4018/IJSSE.2016100102}, timestamp = {Sat, 02 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/SharmaSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/TeichmannRE16, author = {Clemens Teichmann and Stephan Renatus and J{\"{o}}rn Eichler}, title = {Agile Threat Assessment and Mitigation: An Approach for Method Selection and Tailoring}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {1}, pages = {1--16}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016010101}, doi = {10.4018/IJSSE.2016010101}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/TeichmannRE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/YasarK16, author = {Hasan Yasar and Kiriakos Kontostathis}, title = {Where to Integrate Security Practices on DevOps Platform}, journal = {Int. J. Secur. Softw. Eng.}, volume = {7}, number = {4}, pages = {39--50}, year = {2016}, url = {https://doi.org/10.4018/IJSSE.2016100103}, doi = {10.4018/IJSSE.2016100103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/YasarK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/AlebrahimHFGC15, author = {Azadeh Alebrahim and Denis Hatebur and Stephan Fa{\ss}bender and Ludger Goeke and Isabelle C{\^{o}}t{\'{e}}}, title = {A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to {ISO} 27001 for Cloud Systems}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {1}, pages = {24--46}, year = {2015}, url = {https://doi.org/10.4018/ijsse.2015010102}, doi = {10.4018/ijsse.2015010102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/AlebrahimHFGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ArmandoBMS15, author = {Alessandro Armando and Michele Bezzi and Nadia Metoui and Antonino Sabetta}, title = {Risk-Based Privacy-Aware Information Disclosure}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {70--89}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040104}, doi = {10.4018/IJSSE.2015040104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ArmandoBMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BeckersKY15, author = {Kristian Beckers and Leanid Krautsevich and Artsiom Yautsiukhin}, title = {Using Attack Graphs to Analyze Social Engineering Threats}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {47--69}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040103}, doi = {10.4018/IJSSE.2015040103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BeckersKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ChothiaNS15, author = {Tom Chothia and Chris Novakovic and Rajiv Ranjan Singh}, title = {Calculating Quantitative Integrity and Secrecy for Imperative Programs}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {23--46}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040102}, doi = {10.4018/IJSSE.2015040102}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/ChothiaNS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DadkhahS15, author = {Mehdi Dadkhah and Shahaboddin Shamshirband}, title = {An Introduction to Remote Installation Vulnerability in Content Management Systems}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {4}, pages = {52--63}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015100103}, doi = {10.4018/IJSSE.2015100103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DadkhahS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/El-Attar15, author = {Mohamed El{-}Attar}, title = {Supporting Consistency during the Development and Evolution of Quality Unified Use-Misuse Case Models}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {4}, pages = {1--31}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015100101}, doi = {10.4018/IJSSE.2015100101}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/El-Attar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ErdoganSSHA15, author = {Gencer Erdogan and Fredrik Seehusen and Ketil St{\o}len and Jon Hofstad and Jan {\O}yvind Aagedal}, title = {Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {90--112}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040105}, doi = {10.4018/IJSSE.2015040105}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ErdoganSSHA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FalahAO15, author = {Bouchaib Falah and Mohammed Akour and Samia Oukemeni}, title = {An Alternative Threat Model-based Approach for Security Testing}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {3}, pages = {50--64}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015070103}, doi = {10.4018/IJSSE.2015070103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FalahAO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/GayMS15, author = {Richard Gay and Heiko Mantel and Henning Sudbrock}, title = {An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {2}, pages = {1--22}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015040101}, doi = {10.4018/IJSSE.2015040101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/GayMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MeadMA15, author = {Nancy R. Mead and Jose Andre Morales and Gregory Paul Alice}, title = {A Method and Case Study for Using Malware Analysis to Improve Security Requirements}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {1}, pages = {1--23}, year = {2015}, url = {https://doi.org/10.4018/ijsse.2015010101}, doi = {10.4018/ijsse.2015010101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MeadMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MunetohY15, author = {Seiji Munetoh and Nobukazu Yoshioka}, title = {Method Using Command Abstraction Library for Iterative Testing Security of Web Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {3}, pages = {26--49}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015070102}, doi = {10.4018/IJSSE.2015070102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MunetohY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/RaschkeZBLSK15, author = {Wolfgang Raschke and Massimiliano Zilli and Philip Baumgartner and Johannes Loinig and Christian Steger and Christian Kreiner}, title = {Balancing Product and Process Assurance for Evolving Security Systems}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {1}, pages = {47--75}, year = {2015}, url = {https://doi.org/10.4018/ijsse.2015010103}, doi = {10.4018/ijsse.2015010103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/RaschkeZBLSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/RjaibiR15, author = {Neila Rjaibi and Latifa Ben Arfa Rabai}, title = {Expansion and Practical Implementation of the {MFC} Cybersecurity Model via a Novel Security Requirements Taxonomy}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {4}, pages = {32--51}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015100102}, doi = {10.4018/IJSSE.2015100102}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/RjaibiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ShahriarHD15, author = {Hossain Shahriar and Hisham M. Haddad and Vamshee Krishna Devendran}, title = {Request and Response Analysis Framework for Mitigating Clickjacking Attacks}, journal = {Int. J. Secur. Softw. Eng.}, volume = {6}, number = {3}, pages = {1--25}, year = {2015}, url = {https://doi.org/10.4018/IJSSE.2015070101}, doi = {10.4018/IJSSE.2015070101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ShahriarHD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BeckersCGGH14, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Ludger Goeke and Selim G{\"{u}}ler and Maritta Heisel}, title = {A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {2}, pages = {20--43}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014040102}, doi = {10.4018/ijsse.2014040102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BeckersCGGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/CianciaMMMPP14, author = {Vincenzo Ciancia and Jos{\'{e}} Antonio Mart{\'{\i}}n and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi and Ernesto Pimentel}, title = {Automated Synthesis and Ranking of Secure {BPMN} Orchestrators}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {2}, pages = {44--64}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014040103}, doi = {10.4018/ijsse.2014040103}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/CianciaMMMPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/CobourneKMM14, author = {Sheila Cobourne and Lazaros Kyrillidis and Keith Mayes and Konstantinos Markantonakis}, title = {Remote E-Voting Using the Smart Card Web Server}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {39--60}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010103}, doi = {10.4018/ijsse.2014010103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/CobourneKMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/EssafiG14, author = {Mehrez Essafi and Henda Ben Gh{\'{e}}zala}, title = {Meta-Modeling Based Secure Software Development Processes}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {3}, pages = {56--74}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014070104}, doi = {10.4018/ijsse.2014070104}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/EssafiG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FeldererKKJOPTT14, author = {Michael Felderer and Basel Katt and Philipp Kalb and Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa and Federica Paci and Le Minh Sang Tran and Thein Than Tun and Koen Yskout and Riccardo Scandariato and Frank Piessens and Dries Vanoverberghe and Elizabeta Fourneret and Matthias Gander and Bj{\o}rnar Solhaug and Ruth Breu}, title = {Evolution of Security Engineering Artifacts: {A} State of the Art Survey}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {4}, pages = {48--98}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014100103}, doi = {10.4018/ijsse.2014100103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FeldererKKJOPTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FrickerRC14, author = {Christine Fricker and Philippe Robert and Yousra Chabchoub}, title = {Improving the Detection of On-Line Vertical Port Scan in {IP} Traffic}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {61--74}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010104}, doi = {10.4018/ijsse.2014010104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FrickerRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/HovsepyanSSJ14, author = {Aram Hovsepyan and Riccardo Scandariato and Maximilian Steff and Wouter Joosen}, title = {Design Churn as Predictor of Vulnerabilities?}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {3}, pages = {16--31}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014070102}, doi = {10.4018/ijsse.2014070102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/HovsepyanSSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KobashiYKWOF14, author = {Takanori Kobashi and Nobukazu Yoshioka and Haruhiko Kaiya and Hironori Washizaki and Takao Okubo and Yoshiaki Fukazawa}, title = {Validating Security Design Pattern Applications by Testing Design Models}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {4}, pages = {1--30}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014100101}, doi = {10.4018/ijsse.2014100101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KobashiYKWOF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/LudinardTTNKAAB14, author = {Romaric Ludinard and Eric Totel and Fr{\'{e}}d{\'{e}}ric Tronel and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata and Rim Akrout and Yann Bachy}, title = {An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {19--38}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010102}, doi = {10.4018/ijsse.2014010102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/LudinardTTNKAAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MelandPGPDG14, author = {Per H{\aa}kon Meland and Elda Paja and Erlend Andreas Gj{\ae}re and St{\'{e}}phane Paul and Fabiano Dalpiaz and Paolo Giorgini}, title = {Threat Analysis in Goal-Oriented Security Requirements Modelling}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {2}, pages = {1--19}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014040101}, doi = {10.4018/ijsse.2014040101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MelandPGPDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ShahriarNCM14, author = {Hossain Shahriar and Sarah North and Wei{-}Chuen Chen and Edward Mawangi}, title = {Information Theoretic {XSS} Attack Detection in Web Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {3}, pages = {1--15}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014070101}, doi = {10.4018/ijsse.2014070101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ShahriarNCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SongCM14, author = {Mingqiu Song and Donghao Chen and Elizabeth Sylvester Mkoba}, title = {Secure Software Development Assimilation: Effects of External Pressures and Roles of Internal Factors}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {3}, pages = {32--55}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014070103}, doi = {10.4018/ijsse.2014070103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SongCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/TetmeyerHS14, author = {Annette Tetmeyer and Daniel D. Hein and Hossein Saiedian}, title = {A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {4}, pages = {31--47}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014100102}, doi = {10.4018/ijsse.2014100102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/TetmeyerHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ToumiCA14, author = {Khalifa Toumi and Ana R. Cavalli and C{\'{e}}sar Andr{\'{e}}s}, title = {Validation of a Trust Approach in Multi-Organization Environments}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {1--18}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010101}, doi = {10.4018/ijsse.2014010101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ToumiCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/AlaviIJA13, author = {Reza Alavi and Shareeful Islam and Hamid Jahankhani and Ameer Al{-}Nemrat}, title = {Analyzing Human Factors for an Effective Information Security Management System}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {50--74}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010104}, doi = {10.4018/jsse.2013010104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/AlaviIJA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/CaldeiraSVMSBK13, author = {Filipe Caldeira and Thomas Schaberreiter and S{\'{e}}bastien Varrette and Edmundo Monteiro and Paulo Sim{\~{o}}es and Pascal Bouvry and Djamel Khadraoui}, title = {Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {4}, pages = {47--69}, year = {2013}, url = {https://doi.org/10.4018/ijsse.2013100103}, doi = {10.4018/ijsse.2013100103}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/CaldeiraSVMSBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Corcalciuc13, author = {Horia V. Corcalciuc}, title = {A Taxonomy Built on Layers of Abstraction for Time and State Vulnerabilities}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {2}, pages = {40--66}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013040103}, doi = {10.4018/jsse.2013040103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Corcalciuc13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Crawford13, author = {Jeff Crawford}, title = {Assessing the Value of Formal Control Mechanisms on Strong Password Selection}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {1--17}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070101}, doi = {10.4018/jsse.2013070101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Crawford13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DubreuilBTL13, author = {Jean Dubreuil and Guillaume Bouffard and Bhagyalekshmy N. Thampi and Jean{-}Louis Lanet}, title = {Mitigating Type Confusion on Java Card}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {2}, pages = {19--39}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013040102}, doi = {10.4018/jsse.2013040102}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DubreuilBTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KaiyaSOK13, author = {Haruhiko Kaiya and Junya Sakai and Shinpei Ogata and Kenji Kaijiri}, title = {Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {42--63}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070103}, doi = {10.4018/jsse.2013070103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KaiyaSOK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MatsunoY13, author = {Yutaka Matsuno and Shuichiro Yamamoto}, title = {A New Method for Writing Assurance Cases}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {31--49}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010103}, doi = {10.4018/jsse.2013010103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MatsunoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MeadSW13, author = {Nancy R. Mead and Daniel Shoemaker and Carol Woody}, title = {Principles and Measurement Models for Software Assurance}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {1--10}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010101}, doi = {10.4018/jsse.2013010101}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MeadSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MelandG13, author = {Per H{\aa}kon Meland and Erlend Andreas Gj{\ae}re}, title = {Threat Representation Methods for Composite Service Process Models}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {2}, pages = {1--18}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013040101}, doi = {10.4018/jsse.2013040101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MelandG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MillerAGA13, author = {Simon Miller and Susan Appleby and Jonathan M. Garibaldi and Uwe Aickelin}, title = {Towards a More Systematic Approach to Secure Systems Design and Analysis}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {11--30}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010102}, doi = {10.4018/jsse.2013010102}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MillerAGA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MurvayG13, author = {Pal{-}Stefan Murvay and Bogdan Groza}, title = {Performance Evaluation of {SHA-2} Standard vs. {SHA-3} Finalists on Two Freescale Platforms}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {4}, pages = {1--24}, year = {2013}, url = {https://doi.org/10.4018/ijsse.2013100101}, doi = {10.4018/ijsse.2013100101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MurvayG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/RjaibiRAM13, author = {Neila Rjaibi and Latifa Ben Arfa Rabai and Anis Ben Aissa and Ali Mili}, title = {Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {64--81}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070104}, doi = {10.4018/jsse.2013070104}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/RjaibiRAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/VugrinT13, author = {Eric D. Vugrin and Jennifer Turgeon}, title = {Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessments}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {75--96}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010105}, doi = {10.4018/jsse.2013010105}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/VugrinT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/WangLRK13, author = {Li Wang and Zheng Li and Shangping Ren and Kevin A. Kwiat}, title = {Optimal Voting Strategy against Random and Targeted Attacks}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {4}, pages = {25--46}, year = {2013}, url = {https://doi.org/10.4018/ijsse.2013100102}, doi = {10.4018/ijsse.2013100102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/WangLRK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/WuGS13, author = {Yan Wu and Robin A. Gandhi and Harvey P. Siy}, title = {Semi-Automatic Annotation of Natural Language Vulnerability Reports}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {18--41}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070102}, doi = {10.4018/jsse.2013070102}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/WuGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BagnatoKMS12, author = {Alessandra Bagnato and Barbara Kordy and Per H{\aa}kon Meland and Patrick Schweitzer}, title = {Attribute Decoration of Attack-Defense Trees}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {2}, pages = {1--35}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012040101}, doi = {10.4018/jsse.2012040101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BagnatoKMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DiaF12, author = {Ousmane Amadou Dia and Csilla Farkas}, title = {A Practical Framework for Policy Composition and Conflict Resolution}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {4}, pages = {1--26}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012100101}, doi = {10.4018/jsse.2012100101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DiaF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FuKYD12, author = {Yujian Fu and Jeffery Kulick and Lok K. Yan and Steven Drager}, title = {Formal Modeling and Verification of Security Property in Handel {C} Program}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {3}, pages = {50--65}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012070103}, doi = {10.4018/jsse.2012070103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FuKYD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/HachanaCC12, author = {Safa{\`{a}} Hachana and Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {Role Mining to Assist Authorization Governance: How Far Have We Gone?}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {4}, pages = {45--64}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012100103}, doi = {10.4018/jsse.2012100103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/HachanaCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/IslamMKHZ12, author = {Shareeful Islam and Haralambos Mouratidis and Christos Kalloniatis and Aleksandar Hudic and Lorenz Zechner}, title = {Model Based Process to Support Security and Privacy Requirements Engineering}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {3}, pages = {1--22}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012070101}, doi = {10.4018/jsse.2012070101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/IslamMKHZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KarpatiSM12, author = {P{\'{e}}ter K{\'{a}}rp{\'{a}}ti and Guttorm Sindre and Raimundas Matulevicius}, title = {Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {2}, pages = {54--73}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012040103}, doi = {10.4018/jsse.2012040103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KarpatiSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Khan12, author = {Khaled M. Khan}, title = {Software Security Engineering: Design and Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {1}, pages = {62--63}, year = {2012}, url = {https://doi.org/10.4018/IJSSE.2012010104}, doi = {10.4018/IJSSE.2012010104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Khan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KumariC12, author = {K. Shantha Kumari and T. Chithralekha}, title = {A Comparative Analysis of Access Control Policy Modeling Approaches}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {4}, pages = {65--83}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012100104}, doi = {10.4018/jsse.2012100104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KumariC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/OkuboKY12, author = {Takao Okubo and Haruhiko Kaiya and Nobukazu Yoshioka}, title = {Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {1}, pages = {37--61}, year = {2012}, url = {https://doi.org/10.4018/IJSSE.2012010103}, doi = {10.4018/IJSSE.2012010103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/OkuboKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/OpdahlR12, author = {Andreas L. Opdahl and Christian Raspotnig}, title = {Improving Security and Safety Modelling with Failure Sequence Diagrams}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {1}, pages = {20--36}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012010102}, doi = {10.4018/jsse.2012010102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/OpdahlR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/PavlidisMI12, author = {Michalis Pavlidis and Haralambos Mouratidis and Shareeful Islam}, title = {Modelling Security Using Trust Based Concepts}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {2}, pages = {36--53}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012040102}, doi = {10.4018/jsse.2012040102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/PavlidisMI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SaidaneG12, author = {Ayda Sa{\"{\i}}dane and Nicolas Guelfi}, title = {{SETER:} Towards Architecture-Model Based Security Engineering}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {3}, pages = {23--49}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012070102}, doi = {10.4018/jsse.2012070102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SaidaneG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SpitzSJ12, author = {Bernard Spitz and Riccardo Scandariato and Wouter Joosen}, title = {Extraction of an Architectural Model for Least Privilege Analysis}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {4}, pages = {27--44}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012100102}, doi = {10.4018/jsse.2012100102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SpitzSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/TrostererBDPGT12, author = {Sandra Tr{\"{o}}sterer and Elke Beck and Fabiano Dalpiaz and Elda Paja and Paolo Giorgini and Manfred Tscheligi}, title = {Formative User-Centered Evaluation of Security Modeling: Results from a Case Study}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {1}, pages = {1--19}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012010101}, doi = {10.4018/jsse.2012010101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/TrostererBDPGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Al-Ahmad11, author = {Walid Al{-}Ahmad}, title = {Building Secure Software Using {XP}}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {3}, pages = {63--76}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011070104}, doi = {10.4018/jsse.2011070104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Al-Ahmad11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/AsnarMSRFTKLSZ11, author = {Yudistira Asnar and Fabio Massacci and Ayda Sa{\"{\i}}dane and Carlo Riccucci and Massimo Felici and Alessandra Tedeschi and Paul El Khoury and Keqin Li and Magali Seguran and Nicola Zannone}, title = {Organizational Patterns for Security and Dependability: From Design to Application}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {3}, pages = {1--22}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011070101}, doi = {10.4018/jsse.2011070101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/AsnarMSRFTKLSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/AvallePPS11, author = {Matteo Avalle and Alfredo Pironti and Davide Pozza and Riccardo Sisto}, title = {JavaSPI: {A} Framework for Security Protocol Implementation}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {4}, pages = {34--48}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011100103}, doi = {10.4018/jsse.2011100103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/AvallePPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BaiK11, author = {Yun Bai and Khaled M. Khan}, title = {Ell Secure Information System Using Modal Logic Technique}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {2}, pages = {65--76}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011040104}, doi = {10.4018/jsse.2011040104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BaiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DarwishB11, author = {Wesam Darwish and Konstantin Beznosov}, title = {Analysis of {ANSI} {RBAC} Support in {EJB}}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {2}, pages = {25--52}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011040102}, doi = {10.4018/jsse.2011040102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DarwishB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DurandFAKS11, author = {Jan Durand and Juan Flores and Travis Atkison and Nicholas A. Kraft and Randy K. Smith}, title = {Using Executable Slicing to Improve Rogue Software Detection Algorithms}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {2}, pages = {53--64}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011040103}, doi = {10.4018/jsse.2011040103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DurandFAKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FailyF11, author = {Shamal Faily and Ivan Flechais}, title = {Eliciting Policy Requirements for Critical National Infrastructure Using the {IRIS} Framework}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {4}, pages = {1--18}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011100101}, doi = {10.4018/jsse.2011100101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FailyF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/JensenJ11, author = {Jostein Jensen and Martin Gilje Jaatun}, title = {Not Ready for Prime Time: {A} Survey on Security in Model Driven Development}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {4}, pages = {49--61}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011100104}, doi = {10.4018/jsse.2011100104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/JensenJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/JungRS11, author = {Christian Jung and Manuel Rudolph and Reinhard Schwarz}, title = {Security Evaluation of Service-Oriented Systems Using the SiSOA Method}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {4}, pages = {19--33}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011100102}, doi = {10.4018/jsse.2011100102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/JungRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MouratidisK11, author = {Haralambos Mouratidis and Miao Kang}, title = {Secure by Design: Developing Secure Software Systems from the Ground Up}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {3}, pages = {23--41}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011070102}, doi = {10.4018/jsse.2011070102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MouratidisK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/NetoV11, author = {Afonso Ara{\'{u}}jo Neto and Marco Vieira}, title = {Security Gaps in Databases: {A} Comparison of Alternative Software Products for Web Applications Support}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {3}, pages = {42--62}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011070103}, doi = {10.4018/jsse.2011070103}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/NetoV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/NisbetR11, author = {Alastair Nisbet and Mohammed A. Rashid}, title = {Performance Evaluation of Secure Key Deployment and Exchange Protocol for MANETs}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {1}, pages = {1--21}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011010101}, doi = {10.4018/jsse.2011010101}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/NisbetR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/PolicarpioZ11, author = {Sean Policarpio and Yan Zhang}, title = {A Formal Language for {XML} Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {1}, pages = {22--39}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011010102}, doi = {10.4018/jsse.2011010102}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/PolicarpioZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SchwarzlW11, author = {Christian Schwarzl and Edgar R. Weippl}, title = {A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {1}, pages = {40--83}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011010103}, doi = {10.4018/jsse.2011010103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SchwarzlW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/WuytsSVJ11, author = {Kim Wuyts and Riccardo Scandariato and Griet Verhenneman and Wouter Joosen}, title = {Integrating Patient Consent in e-Health Access Control}, journal = {Int. J. Secur. Softw. Eng.}, volume = {2}, number = {2}, pages = {1--24}, year = {2011}, url = {https://doi.org/10.4018/jsse.2011040101}, doi = {10.4018/jsse.2011040101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/WuytsSVJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/AdenijiL10, author = {Aderemi O. Adeniji and Seok{-}Won Lee}, title = {Assimilating and Optimizing Software Assurance in the {SDLC:} {A} Framework and Step-Wise Approach}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {4}, pages = {62--80}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010100104}, doi = {10.4018/jsse.2010100104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/AdenijiL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Bai10, author = {Yun Bai}, title = {A Formal Approach for Securing {XML} Document}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {41--53}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102003}, doi = {10.4018/jsse.2010102003}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Bai10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Barjis10, author = {Joseph Barjis}, title = {Software Engineering Security Based on Business Process Modeling}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {2}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010040101}, doi = {10.4018/jsse.2010040101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Barjis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BratusORSL10, author = {Sergey Bratus and James Oakley and Ashwin Ramaswamy and Sean W. Smith and Michael E. Locasto}, title = {Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010070101}, doi = {10.4018/jsse.2010070101}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BratusORSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DaiMK10, author = {Huning Dai and Christian Murphy and Gail E. Kaiser}, title = {{CONFU:} Configuration Fuzzing Testing Framework for Software Vulnerability Detection}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {41--55}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010070103}, doi = {10.4018/jsse.2010070103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DaiMK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DoanDMB10, author = {Thuong Doan and Steven A. Demurjian and Laurent Michel and Solomon Berhe}, title = {Integrating Access Control into {UML} for Secure Software Modeling and Analysis}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {1--19}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102001}, doi = {10.4018/jsse.2010102001}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DoanDMB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FailyF10, author = {Shamal Faily and Ivan Flechais}, title = {Towards Tool-Support for Usable Secure Requirements Engineering with {CAIRIS}}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {56--70}, year = {2010}, url = {https://doi.org/10.4018/IJSSE.2010070104}, doi = {10.4018/IJSSE.2010070104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FailyF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/GirardMHD10, author = {Fr{\'{e}}d{\'{e}}ric Girard and Bertrand Meunier and Duan Hua and Eric Dubois}, title = {A Rigorous Approach to the Definition of an International Vocational Master's Degree in Information Security Management}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {4}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010100101}, doi = {10.4018/jsse.2010100101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/GirardMHD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KhanH10, author = {Khaled M. Khan and Jun Han}, title = {A Tool Support for Secure Software Integration}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {2}, pages = {35--56}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010040103}, doi = {10.4018/jsse.2010040103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KhanH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Mead10, author = {Nancy R. Mead}, title = {Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {74--91}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102005}, doi = {10.4018/jsse.2010102005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Mead10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MeadAAHKLM10, author = {Nancy R. Mead and Julia H. Allen and Mark A. Ardis and Thomas B. Hilburn and Andrew J. Kornecki and Richard C. Linger and James McDonald}, title = {Development of a Master of Software Assurance Reference Curriculum}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {4}, pages = {18--34}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010100102}, doi = {10.4018/jsse.2010100102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MeadAAHKLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/NhlabatsiNY10, author = {Armstrong Nhlabatsi and Bashar Nuseibeh and Yijun Yu}, title = {Security Requirements Engineering for Evolving Software Systems: {A} Survey}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {54--73}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102004}, doi = {10.4018/jsse.2010102004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/NhlabatsiNY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/NicolaysenSLJ10, author = {Torstein Nicolaysen and Richard Sasson and Maria B. Line and Martin Gilje Jaatun}, title = {Agile Software Development: The Straight and Narrow Path to Secure Software?}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {71--85}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010070105}, doi = {10.4018/jsse.2010070105}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/NicolaysenSLJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ShahriarZ10, author = {Hossain Shahriar and Mohammad Zulkernine}, title = {Monitoring Buffer Overflow Attacks: {A} Perennial Task}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {18--40}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010070102}, doi = {10.4018/jsse.2010070102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ShahriarZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SimpsonSEP10, author = {Joseph J. Simpson and Mary J. Simpson and Barbara Endicott{-}Popovsky and Viatcheslav Popovsky}, title = {Secure Software Education: {A} Contextual Model-Based Approach}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {4}, pages = {35--61}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010100103}, doi = {10.4018/jsse.2010100103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SimpsonSEP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SunB10, author = {San{-}Tsai Sun and Konstantin Beznosov}, title = {Retrofitting Existing Web Applications with Effective Dynamic Protection Against {SQL} Injection Attacks}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {20--40}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102002}, doi = {10.4018/jsse.2010102002}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SunB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Yee10, author = {George O. M. Yee}, title = {Towards Designing E-Services that Protect Privacy}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {2}, pages = {18--34}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010040102}, doi = {10.4018/jsse.2010040102}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Yee10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/YounanJPE10, author = {Yves Younan and Wouter Joosen and Frank Piessens and Hans Van den Eynden}, title = {Improving Memory Management Security for {C} and {C++}}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {2}, pages = {57--82}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010040104}, doi = {10.4018/jsse.2010040104}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/YounanJPE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.