Search dblp for Publications

export results for "stream:streams/journals/ijsse:"

 download as .bib file

@article{DBLP:journals/ijsse/BeheraB17,
  author    = {Chandan Kumar Behera and
               D. Lalitha Bhaskari},
  title     = {Self-Modifying Code: {A} Provable Technique for Enhancing Program
               Obfuscation},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {3},
  pages     = {24--41},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017070102},
  doi       = {10.4018/IJSSE.2017070102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/BeheraB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BoldtJBC17,
  author    = {Martin Boldt and
               Andreas Jacobsson and
               Dejan Baca and
               Bengt Carlsson},
  title     = {Introducing a Novel Security-Enhanced Agile Software Development Process},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {2},
  pages     = {26--52},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017040102},
  doi       = {10.4018/IJSSE.2017040102},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/BoldtJBC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/JimenezOR17,
  author    = {Lina M. Jimenez and
               Mart{\'{\i}}n Ochoa and
               Sandra Julieta Rueda},
  title     = {Jif-Based Verification of Information Flow Policies for Android Apps},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {1},
  pages     = {28--42},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017010102},
  doi       = {10.4018/IJSSE.2017010102},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/JimenezOR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KalloniatisPKG17,
  author    = {Christos Kalloniatis and
               Argyri Pattakou and
               Evangelia Kavakli and
               Stefanos Gritzalis},
  title     = {Designing Secure and Privacy-Aware Information Systems},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {2},
  pages     = {1--25},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017040101},
  doi       = {10.4018/IJSSE.2017040101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/KalloniatisPKG17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MisraADM17,
  author    = {Sanjay Misra and
               Adewole Adewumi and
               Robertas Damasevicius and
               Rytis Maskeliunas},
  title     = {Analysis of Existing Software Cognitive Complexity Measures},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {4},
  pages     = {51--71},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017100103},
  doi       = {10.4018/IJSSE.2017100103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MisraADM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/OyetoyanJC17,
  author    = {Tosin Daniel Oyetoyan and
               Martin Gilje Jaatun and
               Daniela Soares Cruzes},
  title     = {A Lightweight Measurement of Software Security Skills, Usage and Training
               Needs in Agile Teams},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {1},
  pages     = {1--27},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017010101},
  doi       = {10.4018/IJSSE.2017010101},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/OyetoyanJC17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ReisA17,
  author    = {Sofia Reis and
               Rui Abreu},
  title     = {A Database of Existing Vulnerabilities to Enable Controlled Testing
               Studies},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {3},
  pages     = {1--23},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017070101},
  doi       = {10.4018/IJSSE.2017070101},
  timestamp = {Tue, 13 Apr 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ReisA17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/RindellHL17,
  author    = {Kalle Rindell and
               Sami Hyrynsalmi and
               Ville Lepp{\"{a}}nen},
  title     = {Case Study of Agile Security Engineering: Building Identity Management
               for a Government Agency},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {1},
  pages     = {43--57},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017010103},
  doi       = {10.4018/IJSSE.2017010103},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/RindellHL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ShahriarHB17,
  author    = {Hossain Shahriar and
               Hisham Haddad and
               Pranahita Bulusu},
  title     = {{LDAP} Vulnerability Detection in Web Applications},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {4},
  pages     = {31--50},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017100102},
  doi       = {10.4018/IJSSE.2017100102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ShahriarHB17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/TondelJCM17,
  author    = {Inger Anne T{\o}ndel and
               Martin Gilje Jaatun and
               Daniela Soares Cruzes and
               Nils Brede Moe},
  title     = {Risk Centric Activities in Secure Software Development in Public Organisations},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {4},
  pages     = {1--30},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017100101},
  doi       = {10.4018/IJSSE.2017100101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/TondelJCM17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/YuKYHWXF17,
  author    = {Yijun Yu and
               Haruhiko Kaiya and
               Nobukazu Yoshioka and
               Zhenjiang Hu and
               Hironori Washizaki and
               Yingfei Xiong and
               Amin Hosseinian Far},
  title     = {Goal Modelling for Security Problem Matching and Pattern Enforcement},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {3},
  pages     = {42--57},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017070103},
  doi       = {10.4018/IJSSE.2017070103},
  timestamp = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/YuKYHWXF17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/YuLR17,
  author    = {Liguo Yu and
               Yingmei Li and
               Srini Ramaswamy},
  title     = {Design Patterns and Design Quality: Theoretical Analysis, Empirical
               Study, and User Experience},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {8},
  number    = {2},
  pages     = {53--81},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJSSE.2017040103},
  doi       = {10.4018/IJSSE.2017040103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/YuLR17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Al-HadhramiAO16,
  author    = {Nasser Al{-}Hadhrami and
               Benjamin Aziz and
               Lotfi Ben Othmane},
  title     = {An Incremental B-Model for RBAC-Controlled Electronic Marking System},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {2},
  pages     = {37--64},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016040103},
  doi       = {10.4018/IJSSE.2016040103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Al-HadhramiAO16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ArogundadeAJY16,
  author    = {Oluwasefunmi 'Tale Arogundade and
               Olusola John Adeniran and
               Zhi Jin and
               Xiaoguang Yang},
  title     = {Towards Ontological Approach to Security Risk Analysis of Information
               System: Model and Architecture},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {3},
  pages     = {1--25},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016070101},
  doi       = {10.4018/IJSSE.2016070101},
  timestamp = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/ArogundadeAJY16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/IslamFWK16,
  author    = {Shareeful Islam and
               Stefan Fenz and
               Edgar R. Weippl and
               Christos Kalloniatis},
  title     = {Migration Goals and Risk Management in Cloud Computing: {A} Review
               of State of the Art and Survey Results on Practitioners},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {3},
  pages     = {44--73},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016070103},
  doi       = {10.4018/IJSSE.2016070103},
  timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/IslamFWK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Omoronyia16,
  author    = {Inah Omoronyia},
  title     = {The Case for Privacy Awareness Requirements},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {2},
  pages     = {19--36},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016040102},
  doi       = {10.4018/IJSSE.2016040102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Omoronyia16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/OueslatiROGA16,
  author    = {Hela Oueslati and
               Mohammad Masudur Rahman and
               Lotfi Ben Othmane and
               Imran Ghani and
               Adila Firdaus Bt Arbain},
  title     = {Evaluation of the Challenges of Developing Secure Software Using the
               Agile Approach},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {1},
  pages     = {17--37},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016010102},
  doi       = {10.4018/IJSSE.2016010102},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/OueslatiROGA16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/PietikainenKR16,
  author    = {Pekka Pietik{\"{a}}inen and
               Atte Kettunen and
               Juha R{\"{o}}ning},
  title     = {Steps Towards Fuzz Testing in Agile Test Automation},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {1},
  pages     = {38--52},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016010103},
  doi       = {10.4018/IJSSE.2016010103},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/PietikainenKR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/PondeS16,
  author    = {Poonam Ponde and
               Shailaja Shirwaikar},
  title     = {An Exploratory Study of the Security Design Pattern Landscape and
               their Classification},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {3},
  pages     = {26--43},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016070102},
  doi       = {10.4018/IJSSE.2016070102},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/PondeS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ShahriarH16,
  author    = {Hossain Shahriar and
               Hisham Haddad},
  title     = {Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {2},
  pages     = {1--18},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016040101},
  doi       = {10.4018/IJSSE.2016040101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ShahriarH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ShahriarHLL16,
  author    = {Hossain Shahriar and
               Hisham M. Haddad and
               David Lebron and
               Rubana Yasmin Lupu},
  title     = {Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based
               Applications},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {4},
  pages     = {1--18},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016100101},
  doi       = {10.4018/IJSSE.2016100101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ShahriarHLL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SharmaSS16,
  author    = {Ruchi Sharma and
               Ritu Sibal and
               Avinash K. Shrivastava},
  title     = {Vulnerability Discovery Modeling for Open and Closed Source Software},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {4},
  pages     = {19--38},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016100102},
  doi       = {10.4018/IJSSE.2016100102},
  timestamp = {Sat, 02 Jan 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/SharmaSS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/TeichmannRE16,
  author    = {Clemens Teichmann and
               Stephan Renatus and
               J{\"{o}}rn Eichler},
  title     = {Agile Threat Assessment and Mitigation: An Approach for Method Selection
               and Tailoring},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {1},
  pages     = {1--16},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016010101},
  doi       = {10.4018/IJSSE.2016010101},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/TeichmannRE16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/YasarK16,
  author    = {Hasan Yasar and
               Kiriakos Kontostathis},
  title     = {Where to Integrate Security Practices on DevOps Platform},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {7},
  number    = {4},
  pages     = {39--50},
  year      = {2016},
  url       = {https://doi.org/10.4018/IJSSE.2016100103},
  doi       = {10.4018/IJSSE.2016100103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/YasarK16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/AlebrahimHFGC15,
  author    = {Azadeh Alebrahim and
               Denis Hatebur and
               Stephan Fa{\ss}bender and
               Ludger Goeke and
               Isabelle C{\^{o}}t{\'{e}}},
  title     = {A Pattern-Based and Tool-Supported Risk Analysis Method Compliant
               to {ISO} 27001 for Cloud Systems},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {1},
  pages     = {24--46},
  year      = {2015},
  url       = {https://doi.org/10.4018/ijsse.2015010102},
  doi       = {10.4018/ijsse.2015010102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/AlebrahimHFGC15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ArmandoBMS15,
  author    = {Alessandro Armando and
               Michele Bezzi and
               Nadia Metoui and
               Antonino Sabetta},
  title     = {Risk-Based Privacy-Aware Information Disclosure},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {2},
  pages     = {70--89},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015040104},
  doi       = {10.4018/IJSSE.2015040104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ArmandoBMS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BeckersKY15,
  author    = {Kristian Beckers and
               Leanid Krautsevich and
               Artsiom Yautsiukhin},
  title     = {Using Attack Graphs to Analyze Social Engineering Threats},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {2},
  pages     = {47--69},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015040103},
  doi       = {10.4018/IJSSE.2015040103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/BeckersKY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ChothiaNS15,
  author    = {Tom Chothia and
               Chris Novakovic and
               Rajiv Ranjan Singh},
  title     = {Calculating Quantitative Integrity and Secrecy for Imperative Programs},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {2},
  pages     = {23--46},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015040102},
  doi       = {10.4018/IJSSE.2015040102},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/ChothiaNS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DadkhahS15,
  author    = {Mehdi Dadkhah and
               Shahaboddin Shamshirband},
  title     = {An Introduction to Remote Installation Vulnerability in Content Management
               Systems},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {4},
  pages     = {52--63},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015100103},
  doi       = {10.4018/IJSSE.2015100103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/DadkhahS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/El-Attar15,
  author    = {Mohamed El{-}Attar},
  title     = {Supporting Consistency during the Development and Evolution of Quality
               Unified Use-Misuse Case Models},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {4},
  pages     = {1--31},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015100101},
  doi       = {10.4018/IJSSE.2015100101},
  timestamp = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/El-Attar15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ErdoganSSHA15,
  author    = {Gencer Erdogan and
               Fredrik Seehusen and
               Ketil St{\o}len and
               Jon Hofstad and
               Jan {\O}yvind Aagedal},
  title     = {Assessing the Usefulness of Testing for Validating and Correcting
               Security Risk Models Based on Two Industrial Case Studies},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {2},
  pages     = {90--112},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015040105},
  doi       = {10.4018/IJSSE.2015040105},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ErdoganSSHA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FalahAO15,
  author    = {Bouchaib Falah and
               Mohammed Akour and
               Samia Oukemeni},
  title     = {An Alternative Threat Model-based Approach for Security Testing},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {3},
  pages     = {50--64},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015070103},
  doi       = {10.4018/IJSSE.2015070103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/FalahAO15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/GayMS15,
  author    = {Richard Gay and
               Heiko Mantel and
               Henning Sudbrock},
  title     = {An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {2},
  pages     = {1--22},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015040101},
  doi       = {10.4018/IJSSE.2015040101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/GayMS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MeadMA15,
  author    = {Nancy R. Mead and
               Jose Andre Morales and
               Gregory Paul Alice},
  title     = {A Method and Case Study for Using Malware Analysis to Improve Security
               Requirements},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {1},
  pages     = {1--23},
  year      = {2015},
  url       = {https://doi.org/10.4018/ijsse.2015010101},
  doi       = {10.4018/ijsse.2015010101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MeadMA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MunetohY15,
  author    = {Seiji Munetoh and
               Nobukazu Yoshioka},
  title     = {Method Using Command Abstraction Library for Iterative Testing Security
               of Web Applications},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {3},
  pages     = {26--49},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015070102},
  doi       = {10.4018/IJSSE.2015070102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MunetohY15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/RaschkeZBLSK15,
  author    = {Wolfgang Raschke and
               Massimiliano Zilli and
               Philip Baumgartner and
               Johannes Loinig and
               Christian Steger and
               Christian Kreiner},
  title     = {Balancing Product and Process Assurance for Evolving Security Systems},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {1},
  pages     = {47--75},
  year      = {2015},
  url       = {https://doi.org/10.4018/ijsse.2015010103},
  doi       = {10.4018/ijsse.2015010103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/RaschkeZBLSK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/RjaibiR15,
  author    = {Neila Rjaibi and
               Latifa Ben Arfa Rabai},
  title     = {Expansion and Practical Implementation of the {MFC} Cybersecurity
               Model via a Novel Security Requirements Taxonomy},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {4},
  pages     = {32--51},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015100102},
  doi       = {10.4018/IJSSE.2015100102},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/RjaibiR15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ShahriarHD15,
  author    = {Hossain Shahriar and
               Hisham M. Haddad and
               Vamshee Krishna Devendran},
  title     = {Request and Response Analysis Framework for Mitigating Clickjacking
               Attacks},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {6},
  number    = {3},
  pages     = {1--25},
  year      = {2015},
  url       = {https://doi.org/10.4018/IJSSE.2015070101},
  doi       = {10.4018/IJSSE.2015070101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ShahriarHD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BeckersCGGH14,
  author    = {Kristian Beckers and
               Isabelle C{\^{o}}t{\'{e}} and
               Ludger Goeke and
               Selim G{\"{u}}ler and
               Maritta Heisel},
  title     = {A Structured Method for Security Requirements Elicitation concerning
               the Cloud Computing Domain},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {2},
  pages     = {20--43},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014040102},
  doi       = {10.4018/ijsse.2014040102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/BeckersCGGH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/CianciaMMMPP14,
  author    = {Vincenzo Ciancia and
               Jos{\'{e}} Antonio Mart{\'{\i}}n and
               Fabio Martinelli and
               Ilaria Matteucci and
               Marinella Petrocchi and
               Ernesto Pimentel},
  title     = {Automated Synthesis and Ranking of Secure {BPMN} Orchestrators},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {2},
  pages     = {44--64},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014040103},
  doi       = {10.4018/ijsse.2014040103},
  timestamp = {Wed, 12 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/CianciaMMMPP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/CobourneKMM14,
  author    = {Sheila Cobourne and
               Lazaros Kyrillidis and
               Keith Mayes and
               Konstantinos Markantonakis},
  title     = {Remote E-Voting Using the Smart Card Web Server},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {1},
  pages     = {39--60},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014010103},
  doi       = {10.4018/ijsse.2014010103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/CobourneKMM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/EssafiG14,
  author    = {Mehrez Essafi and
               Henda Ben Gh{\'{e}}zala},
  title     = {Meta-Modeling Based Secure Software Development Processes},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {3},
  pages     = {56--74},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014070104},
  doi       = {10.4018/ijsse.2014070104},
  timestamp = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/EssafiG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FeldererKKJOPTT14,
  author    = {Michael Felderer and
               Basel Katt and
               Philipp Kalb and
               Jan J{\"{u}}rjens and
               Mart{\'{\i}}n Ochoa and
               Federica Paci and
               Le Minh Sang Tran and
               Thein Than Tun and
               Koen Yskout and
               Riccardo Scandariato and
               Frank Piessens and
               Dries Vanoverberghe and
               Elizabeta Fourneret and
               Matthias Gander and
               Bj{\o}rnar Solhaug and
               Ruth Breu},
  title     = {Evolution of Security Engineering Artifacts: {A} State of the Art
               Survey},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {4},
  pages     = {48--98},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014100103},
  doi       = {10.4018/ijsse.2014100103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/FeldererKKJOPTT14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FrickerRC14,
  author    = {Christine Fricker and
               Philippe Robert and
               Yousra Chabchoub},
  title     = {Improving the Detection of On-Line Vertical Port Scan in {IP} Traffic},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {1},
  pages     = {61--74},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014010104},
  doi       = {10.4018/ijsse.2014010104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/FrickerRC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/HovsepyanSSJ14,
  author    = {Aram Hovsepyan and
               Riccardo Scandariato and
               Maximilian Steff and
               Wouter Joosen},
  title     = {Design Churn as Predictor of Vulnerabilities?},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {3},
  pages     = {16--31},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014070102},
  doi       = {10.4018/ijsse.2014070102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/HovsepyanSSJ14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KobashiYKWOF14,
  author    = {Takanori Kobashi and
               Nobukazu Yoshioka and
               Haruhiko Kaiya and
               Hironori Washizaki and
               Takao Okubo and
               Yoshiaki Fukazawa},
  title     = {Validating Security Design Pattern Applications by Testing Design
               Models},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {4},
  pages     = {1--30},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014100101},
  doi       = {10.4018/ijsse.2014100101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/KobashiYKWOF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/LudinardTTNKAAB14,
  author    = {Romaric Ludinard and
               Eric Totel and
               Fr{\'{e}}d{\'{e}}ric Tronel and
               Vincent Nicomette and
               Mohamed Ka{\^{a}}niche and
               Eric Alata and
               Rim Akrout and
               Yann Bachy},
  title     = {An Invariant-Based Approach for Detecting Attacks Against Data in
               Web Applications},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {1},
  pages     = {19--38},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014010102},
  doi       = {10.4018/ijsse.2014010102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/LudinardTTNKAAB14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MelandPGPDG14,
  author    = {Per H{\aa}kon Meland and
               Elda Paja and
               Erlend Andreas Gj{\ae}re and
               St{\'{e}}phane Paul and
               Fabiano Dalpiaz and
               Paolo Giorgini},
  title     = {Threat Analysis in Goal-Oriented Security Requirements Modelling},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {2},
  pages     = {1--19},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014040101},
  doi       = {10.4018/ijsse.2014040101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MelandPGPDG14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ShahriarNCM14,
  author    = {Hossain Shahriar and
               Sarah North and
               Wei{-}Chuen Chen and
               Edward Mawangi},
  title     = {Information Theoretic {XSS} Attack Detection in Web Applications},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {3},
  pages     = {1--15},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014070101},
  doi       = {10.4018/ijsse.2014070101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ShahriarNCM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SongCM14,
  author    = {Mingqiu Song and
               Donghao Chen and
               Elizabeth Sylvester Mkoba},
  title     = {Secure Software Development Assimilation: Effects of External Pressures
               and Roles of Internal Factors},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {3},
  pages     = {32--55},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014070103},
  doi       = {10.4018/ijsse.2014070103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/SongCM14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/TetmeyerHS14,
  author    = {Annette Tetmeyer and
               Daniel D. Hein and
               Hossein Saiedian},
  title     = {A Tagging Approach to Extract Security Requirements in Non-Traditional
               Software Development Processes},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {4},
  pages     = {31--47},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014100102},
  doi       = {10.4018/ijsse.2014100102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/TetmeyerHS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ToumiCA14,
  author    = {Khalifa Toumi and
               Ana R. Cavalli and
               C{\'{e}}sar Andr{\'{e}}s},
  title     = {Validation of a Trust Approach in Multi-Organization Environments},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {5},
  number    = {1},
  pages     = {1--18},
  year      = {2014},
  url       = {https://doi.org/10.4018/ijsse.2014010101},
  doi       = {10.4018/ijsse.2014010101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ToumiCA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/AlaviIJA13,
  author    = {Reza Alavi and
               Shareeful Islam and
               Hamid Jahankhani and
               Ameer Al{-}Nemrat},
  title     = {Analyzing Human Factors for an Effective Information Security Management
               System},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {1},
  pages     = {50--74},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013010104},
  doi       = {10.4018/jsse.2013010104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/AlaviIJA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/CaldeiraSVMSBK13,
  author    = {Filipe Caldeira and
               Thomas Schaberreiter and
               S{\'{e}}bastien Varrette and
               Edmundo Monteiro and
               Paulo Sim{\~{o}}es and
               Pascal Bouvry and
               Djamel Khadraoui},
  title     = {Trust Based Interdependency Weighting for On-Line Risk Monitoring
               in Interdependent Critical Infrastructures},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {4},
  pages     = {47--69},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsse.2013100103},
  doi       = {10.4018/ijsse.2013100103},
  timestamp = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/CaldeiraSVMSBK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Corcalciuc13,
  author    = {Horia V. Corcalciuc},
  title     = {A Taxonomy Built on Layers of Abstraction for Time and State Vulnerabilities},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {2},
  pages     = {40--66},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013040103},
  doi       = {10.4018/jsse.2013040103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Corcalciuc13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Crawford13,
  author    = {Jeff Crawford},
  title     = {Assessing the Value of Formal Control Mechanisms on Strong Password
               Selection},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {3},
  pages     = {1--17},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013070101},
  doi       = {10.4018/jsse.2013070101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Crawford13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DubreuilBTL13,
  author    = {Jean Dubreuil and
               Guillaume Bouffard and
               Bhagyalekshmy N. Thampi and
               Jean{-}Louis Lanet},
  title     = {Mitigating Type Confusion on Java Card},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {2},
  pages     = {19--39},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013040102},
  doi       = {10.4018/jsse.2013040102},
  timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/DubreuilBTL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KaiyaSOK13,
  author    = {Haruhiko Kaiya and
               Junya Sakai and
               Shinpei Ogata and
               Kenji Kaijiri},
  title     = {Eliciting Security Requirements for an Information System using Asset
               Flows and Processor Deployment},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {3},
  pages     = {42--63},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013070103},
  doi       = {10.4018/jsse.2013070103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/KaiyaSOK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MatsunoY13,
  author    = {Yutaka Matsuno and
               Shuichiro Yamamoto},
  title     = {A New Method for Writing Assurance Cases},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {1},
  pages     = {31--49},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013010103},
  doi       = {10.4018/jsse.2013010103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MatsunoY13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MeadSW13,
  author    = {Nancy R. Mead and
               Daniel Shoemaker and
               Carol Woody},
  title     = {Principles and Measurement Models for Software Assurance},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {1},
  pages     = {1--10},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013010101},
  doi       = {10.4018/jsse.2013010101},
  timestamp = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MeadSW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MelandG13,
  author    = {Per H{\aa}kon Meland and
               Erlend Andreas Gj{\ae}re},
  title     = {Threat Representation Methods for Composite Service Process Models},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {2},
  pages     = {1--18},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013040101},
  doi       = {10.4018/jsse.2013040101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MelandG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MillerAGA13,
  author    = {Simon Miller and
               Susan Appleby and
               Jonathan M. Garibaldi and
               Uwe Aickelin},
  title     = {Towards a More Systematic Approach to Secure Systems Design and Analysis},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {1},
  pages     = {11--30},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013010102},
  doi       = {10.4018/jsse.2013010102},
  timestamp = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MillerAGA13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MurvayG13,
  author    = {Pal{-}Stefan Murvay and
               Bogdan Groza},
  title     = {Performance Evaluation of {SHA-2} Standard vs. {SHA-3} Finalists on
               Two Freescale Platforms},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {4},
  pages     = {1--24},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsse.2013100101},
  doi       = {10.4018/ijsse.2013100101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MurvayG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/RjaibiRAM13,
  author    = {Neila Rjaibi and
               Latifa Ben Arfa Rabai and
               Anis Ben Aissa and
               Ali Mili},
  title     = {Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity:
               E-Learning Case Study},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {3},
  pages     = {64--81},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013070104},
  doi       = {10.4018/jsse.2013070104},
  timestamp = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/RjaibiRAM13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/VugrinT13,
  author    = {Eric D. Vugrin and
               Jennifer Turgeon},
  title     = {Advancing Cyber Resilience Analysis with Performance-Based Metrics
               from Infrastructure Assessments},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {1},
  pages     = {75--96},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013010105},
  doi       = {10.4018/jsse.2013010105},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/VugrinT13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/WangLRK13,
  author    = {Li Wang and
               Zheng Li and
               Shangping Ren and
               Kevin A. Kwiat},
  title     = {Optimal Voting Strategy against Random and Targeted Attacks},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {4},
  pages     = {25--46},
  year      = {2013},
  url       = {https://doi.org/10.4018/ijsse.2013100102},
  doi       = {10.4018/ijsse.2013100102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/WangLRK13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/WuGS13,
  author    = {Yan Wu and
               Robin A. Gandhi and
               Harvey P. Siy},
  title     = {Semi-Automatic Annotation of Natural Language Vulnerability Reports},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {4},
  number    = {3},
  pages     = {18--41},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013070102},
  doi       = {10.4018/jsse.2013070102},
  timestamp = {Wed, 19 May 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/WuGS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BagnatoKMS12,
  author    = {Alessandra Bagnato and
               Barbara Kordy and
               Per H{\aa}kon Meland and
               Patrick Schweitzer},
  title     = {Attribute Decoration of Attack-Defense Trees},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {2},
  pages     = {1--35},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012040101},
  doi       = {10.4018/jsse.2012040101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/BagnatoKMS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DiaF12,
  author    = {Ousmane Amadou Dia and
               Csilla Farkas},
  title     = {A Practical Framework for Policy Composition and Conflict Resolution},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {4},
  pages     = {1--26},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012100101},
  doi       = {10.4018/jsse.2012100101},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/DiaF12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FuKYD12,
  author    = {Yujian Fu and
               Jeffery Kulick and
               Lok K. Yan and
               Steven Drager},
  title     = {Formal Modeling and Verification of Security Property in Handel {C}
               Program},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {3},
  pages     = {50--65},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012070103},
  doi       = {10.4018/jsse.2012070103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/FuKYD12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/HachanaCC12,
  author    = {Safa{\`{a}} Hachana and
               Nora Cuppens{-}Boulahia and
               Fr{\'{e}}d{\'{e}}ric Cuppens},
  title     = {Role Mining to Assist Authorization Governance: How Far Have We Gone?},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {4},
  pages     = {45--64},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012100103},
  doi       = {10.4018/jsse.2012100103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/HachanaCC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/IslamMKHZ12,
  author    = {Shareeful Islam and
               Haralambos Mouratidis and
               Christos Kalloniatis and
               Aleksandar Hudic and
               Lorenz Zechner},
  title     = {Model Based Process to Support Security and Privacy Requirements Engineering},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {3},
  pages     = {1--22},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012070101},
  doi       = {10.4018/jsse.2012070101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/IslamMKHZ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KarpatiSM12,
  author    = {P{\'{e}}ter K{\'{a}}rp{\'{a}}ti and
               Guttorm Sindre and
               Raimundas Matulevicius},
  title     = {Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social
               Engineering Attacks},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {2},
  pages     = {54--73},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012040103},
  doi       = {10.4018/jsse.2012040103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/KarpatiSM12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Khan12,
  author    = {Khaled M. Khan},
  title     = {Software Security Engineering: Design and Applications},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {1},
  pages     = {62--63},
  year      = {2012},
  url       = {https://doi.org/10.4018/IJSSE.2012010104},
  doi       = {10.4018/IJSSE.2012010104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Khan12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KumariC12,
  author    = {K. Shantha Kumari and
               T. Chithralekha},
  title     = {A Comparative Analysis of Access Control Policy Modeling Approaches},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {4},
  pages     = {65--83},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012100104},
  doi       = {10.4018/jsse.2012100104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/KumariC12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/OkuboKY12,
  author    = {Takao Okubo and
               Haruhiko Kaiya and
               Nobukazu Yoshioka},
  title     = {Analyzing Impacts on Software Enhancement Caused by Security Design
               Alternatives with Patterns},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {1},
  pages     = {37--61},
  year      = {2012},
  url       = {https://doi.org/10.4018/IJSSE.2012010103},
  doi       = {10.4018/IJSSE.2012010103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/OkuboKY12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/OpdahlR12,
  author    = {Andreas L. Opdahl and
               Christian Raspotnig},
  title     = {Improving Security and Safety Modelling with Failure Sequence Diagrams},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {1},
  pages     = {20--36},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012010102},
  doi       = {10.4018/jsse.2012010102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/OpdahlR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/PavlidisMI12,
  author    = {Michalis Pavlidis and
               Haralambos Mouratidis and
               Shareeful Islam},
  title     = {Modelling Security Using Trust Based Concepts},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {2},
  pages     = {36--53},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012040102},
  doi       = {10.4018/jsse.2012040102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/PavlidisMI12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SaidaneG12,
  author    = {Ayda Sa{\"{\i}}dane and
               Nicolas Guelfi},
  title     = {{SETER:} Towards Architecture-Model Based Security Engineering},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {3},
  pages     = {23--49},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012070102},
  doi       = {10.4018/jsse.2012070102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/SaidaneG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SpitzSJ12,
  author    = {Bernard Spitz and
               Riccardo Scandariato and
               Wouter Joosen},
  title     = {Extraction of an Architectural Model for Least Privilege Analysis},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {4},
  pages     = {27--44},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012100102},
  doi       = {10.4018/jsse.2012100102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/SpitzSJ12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/TrostererBDPGT12,
  author    = {Sandra Tr{\"{o}}sterer and
               Elke Beck and
               Fabiano Dalpiaz and
               Elda Paja and
               Paolo Giorgini and
               Manfred Tscheligi},
  title     = {Formative User-Centered Evaluation of Security Modeling: Results from
               a Case Study},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {3},
  number    = {1},
  pages     = {1--19},
  year      = {2012},
  url       = {https://doi.org/10.4018/jsse.2012010101},
  doi       = {10.4018/jsse.2012010101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/TrostererBDPGT12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Al-Ahmad11,
  author    = {Walid Al{-}Ahmad},
  title     = {Building Secure Software Using {XP}},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {3},
  pages     = {63--76},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011070104},
  doi       = {10.4018/jsse.2011070104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Al-Ahmad11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/AsnarMSRFTKLSZ11,
  author    = {Yudistira Asnar and
               Fabio Massacci and
               Ayda Sa{\"{\i}}dane and
               Carlo Riccucci and
               Massimo Felici and
               Alessandra Tedeschi and
               Paul El Khoury and
               Keqin Li and
               Magali Seguran and
               Nicola Zannone},
  title     = {Organizational Patterns for Security and Dependability: From Design
               to Application},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {3},
  pages     = {1--22},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011070101},
  doi       = {10.4018/jsse.2011070101},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/AsnarMSRFTKLSZ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/AvallePPS11,
  author    = {Matteo Avalle and
               Alfredo Pironti and
               Davide Pozza and
               Riccardo Sisto},
  title     = {JavaSPI: {A} Framework for Security Protocol Implementation},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {4},
  pages     = {34--48},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011100103},
  doi       = {10.4018/jsse.2011100103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/AvallePPS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BaiK11,
  author    = {Yun Bai and
               Khaled M. Khan},
  title     = {Ell Secure Information System Using Modal Logic Technique},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {2},
  pages     = {65--76},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011040104},
  doi       = {10.4018/jsse.2011040104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/BaiK11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DarwishB11,
  author    = {Wesam Darwish and
               Konstantin Beznosov},
  title     = {Analysis of {ANSI} {RBAC} Support in {EJB}},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {2},
  pages     = {25--52},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011040102},
  doi       = {10.4018/jsse.2011040102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/DarwishB11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DurandFAKS11,
  author    = {Jan Durand and
               Juan Flores and
               Travis Atkison and
               Nicholas A. Kraft and
               Randy K. Smith},
  title     = {Using Executable Slicing to Improve Rogue Software Detection Algorithms},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {2},
  pages     = {53--64},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011040103},
  doi       = {10.4018/jsse.2011040103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/DurandFAKS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FailyF11,
  author    = {Shamal Faily and
               Ivan Flechais},
  title     = {Eliciting Policy Requirements for Critical National Infrastructure
               Using the {IRIS} Framework},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {4},
  pages     = {1--18},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011100101},
  doi       = {10.4018/jsse.2011100101},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/FailyF11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/JensenJ11,
  author    = {Jostein Jensen and
               Martin Gilje Jaatun},
  title     = {Not Ready for Prime Time: {A} Survey on Security in Model Driven Development},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {4},
  pages     = {49--61},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011100104},
  doi       = {10.4018/jsse.2011100104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/JensenJ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/JungRS11,
  author    = {Christian Jung and
               Manuel Rudolph and
               Reinhard Schwarz},
  title     = {Security Evaluation of Service-Oriented Systems Using the SiSOA Method},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {4},
  pages     = {19--33},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011100102},
  doi       = {10.4018/jsse.2011100102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/JungRS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MouratidisK11,
  author    = {Haralambos Mouratidis and
               Miao Kang},
  title     = {Secure by Design: Developing Secure Software Systems from the Ground
               Up},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {3},
  pages     = {23--41},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011070102},
  doi       = {10.4018/jsse.2011070102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MouratidisK11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/NetoV11,
  author    = {Afonso Ara{\'{u}}jo Neto and
               Marco Vieira},
  title     = {Security Gaps in Databases: {A} Comparison of Alternative Software
               Products for Web Applications Support},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {3},
  pages     = {42--62},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011070103},
  doi       = {10.4018/jsse.2011070103},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/NetoV11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/NisbetR11,
  author    = {Alastair Nisbet and
               Mohammed A. Rashid},
  title     = {Performance Evaluation of Secure Key Deployment and Exchange Protocol
               for MANETs},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {1},
  pages     = {1--21},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011010101},
  doi       = {10.4018/jsse.2011010101},
  timestamp = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/NisbetR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/PolicarpioZ11,
  author    = {Sean Policarpio and
               Yan Zhang},
  title     = {A Formal Language for {XML} Authorisations Based on Answer Set Programming
               and Temporal Interval Logic Constraints},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {1},
  pages     = {22--39},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011010102},
  doi       = {10.4018/jsse.2011010102},
  timestamp = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/PolicarpioZ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SchwarzlW11,
  author    = {Christian Schwarzl and
               Edgar R. Weippl},
  title     = {A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric
               Systems},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {1},
  pages     = {40--83},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011010103},
  doi       = {10.4018/jsse.2011010103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/SchwarzlW11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/WuytsSVJ11,
  author    = {Kim Wuyts and
               Riccardo Scandariato and
               Griet Verhenneman and
               Wouter Joosen},
  title     = {Integrating Patient Consent in e-Health Access Control},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {2},
  number    = {2},
  pages     = {1--24},
  year      = {2011},
  url       = {https://doi.org/10.4018/jsse.2011040101},
  doi       = {10.4018/jsse.2011040101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/WuytsSVJ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/AdenijiL10,
  author    = {Aderemi O. Adeniji and
               Seok{-}Won Lee},
  title     = {Assimilating and Optimizing Software Assurance in the {SDLC:} {A}
               Framework and Step-Wise Approach},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {4},
  pages     = {62--80},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010100104},
  doi       = {10.4018/jsse.2010100104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/AdenijiL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Bai10,
  author    = {Yun Bai},
  title     = {A Formal Approach for Securing {XML} Document},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {1},
  pages     = {41--53},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010102003},
  doi       = {10.4018/jsse.2010102003},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Bai10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Barjis10,
  author    = {Joseph Barjis},
  title     = {Software Engineering Security Based on Business Process Modeling},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {2},
  pages     = {1--17},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010040101},
  doi       = {10.4018/jsse.2010040101},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Barjis10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BratusORSL10,
  author    = {Sergey Bratus and
               James Oakley and
               Ashwin Ramaswamy and
               Sean W. Smith and
               Michael E. Locasto},
  title     = {Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader
               Toolchain},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {3},
  pages     = {1--17},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010070101},
  doi       = {10.4018/jsse.2010070101},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/BratusORSL10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DaiMK10,
  author    = {Huning Dai and
               Christian Murphy and
               Gail E. Kaiser},
  title     = {{CONFU:} Configuration Fuzzing Testing Framework for Software Vulnerability
               Detection},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {3},
  pages     = {41--55},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010070103},
  doi       = {10.4018/jsse.2010070103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/DaiMK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DoanDMB10,
  author    = {Thuong Doan and
               Steven A. Demurjian and
               Laurent Michel and
               Solomon Berhe},
  title     = {Integrating Access Control into {UML} for Secure Software Modeling
               and Analysis},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {1},
  pages     = {1--19},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010102001},
  doi       = {10.4018/jsse.2010102001},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/DoanDMB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FailyF10,
  author    = {Shamal Faily and
               Ivan Flechais},
  title     = {Towards Tool-Support for Usable Secure Requirements Engineering with
               {CAIRIS}},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {3},
  pages     = {56--70},
  year      = {2010},
  url       = {https://doi.org/10.4018/IJSSE.2010070104},
  doi       = {10.4018/IJSSE.2010070104},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/FailyF10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/GirardMHD10,
  author    = {Fr{\'{e}}d{\'{e}}ric Girard and
               Bertrand Meunier and
               Duan Hua and
               Eric Dubois},
  title     = {A Rigorous Approach to the Definition of an International Vocational
               Master's Degree in Information Security Management},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {4},
  pages     = {1--17},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010100101},
  doi       = {10.4018/jsse.2010100101},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/GirardMHD10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KhanH10,
  author    = {Khaled M. Khan and
               Jun Han},
  title     = {A Tool Support for Secure Software Integration},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {2},
  pages     = {35--56},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010040103},
  doi       = {10.4018/jsse.2010040103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/KhanH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Mead10,
  author    = {Nancy R. Mead},
  title     = {Benefits and Challenges in the Use of Case Studies for Security Requirements
               Engineering Methods},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {1},
  pages     = {74--91},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010102005},
  doi       = {10.4018/jsse.2010102005},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Mead10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MeadAAHKLM10,
  author    = {Nancy R. Mead and
               Julia H. Allen and
               Mark A. Ardis and
               Thomas B. Hilburn and
               Andrew J. Kornecki and
               Richard C. Linger and
               James McDonald},
  title     = {Development of a Master of Software Assurance Reference Curriculum},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {4},
  pages     = {18--34},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010100102},
  doi       = {10.4018/jsse.2010100102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/MeadAAHKLM10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/NhlabatsiNY10,
  author    = {Armstrong Nhlabatsi and
               Bashar Nuseibeh and
               Yijun Yu},
  title     = {Security Requirements Engineering for Evolving Software Systems: {A}
               Survey},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {1},
  pages     = {54--73},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010102004},
  doi       = {10.4018/jsse.2010102004},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/NhlabatsiNY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/NicolaysenSLJ10,
  author    = {Torstein Nicolaysen and
               Richard Sasson and
               Maria B. Line and
               Martin Gilje Jaatun},
  title     = {Agile Software Development: The Straight and Narrow Path to Secure
               Software?},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {3},
  pages     = {71--85},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010070105},
  doi       = {10.4018/jsse.2010070105},
  timestamp = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ijsse/NicolaysenSLJ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ShahriarZ10,
  author    = {Hossain Shahriar and
               Mohammad Zulkernine},
  title     = {Monitoring Buffer Overflow Attacks: {A} Perennial Task},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {3},
  pages     = {18--40},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010070102},
  doi       = {10.4018/jsse.2010070102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/ShahriarZ10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SimpsonSEP10,
  author    = {Joseph J. Simpson and
               Mary J. Simpson and
               Barbara Endicott{-}Popovsky and
               Viatcheslav Popovsky},
  title     = {Secure Software Education: {A} Contextual Model-Based Approach},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {4},
  pages     = {35--61},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010100103},
  doi       = {10.4018/jsse.2010100103},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/SimpsonSEP10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SunB10,
  author    = {San{-}Tsai Sun and
               Konstantin Beznosov},
  title     = {Retrofitting Existing Web Applications with Effective Dynamic Protection
               Against {SQL} Injection Attacks},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {1},
  pages     = {20--40},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010102002},
  doi       = {10.4018/jsse.2010102002},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/SunB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Yee10,
  author    = {George O. M. Yee},
  title     = {Towards Designing E-Services that Protect Privacy},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {2},
  pages     = {18--34},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010040102},
  doi       = {10.4018/jsse.2010040102},
  timestamp = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/Yee10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/YounanJPE10,
  author    = {Yves Younan and
               Wouter Joosen and
               Frank Piessens and
               Hans Van den Eynden},
  title     = {Improving Memory Management Security for {C} and {C++}},
  journal   = {Int. J. Secur. Softw. Eng.},
  volume    = {1},
  number    = {2},
  pages     = {57--82},
  year      = {2010},
  url       = {https://doi.org/10.4018/jsse.2010040104},
  doi       = {10.4018/jsse.2010040104},
  timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijsse/YounanJPE10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics