Search dblp for Publications

export results for "toc:db/journals/ijsse/ijsse4.bht:"

 download as .bib file

@article{DBLP:journals/ijsse/AlaviIJA13,
  author       = {Reza Alavi and
                  Shareeful Islam and
                  Hamid Jahankhani and
                  Ameer Al{-}Nemrat},
  title        = {Analyzing Human Factors for an Effective Information Security Management
                  System},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {50--74},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013010104},
  doi          = {10.4018/JSSE.2013010104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/AlaviIJA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/CaldeiraSVMSBK13,
  author       = {Filipe Caldeira and
                  Thomas Schaberreiter and
                  S{\'{e}}bastien Varrette and
                  Edmundo Monteiro and
                  Paulo Sim{\~{o}}es and
                  Pascal Bouvry and
                  Djamel Khadraoui},
  title        = {Trust Based Interdependency Weighting for On-Line Risk Monitoring
                  in Interdependent Critical Infrastructures},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {47--69},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijsse.2013100103},
  doi          = {10.4018/IJSSE.2013100103},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/CaldeiraSVMSBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Corcalciuc13,
  author       = {Horia V. Corcalciuc},
  title        = {A Taxonomy Built on Layers of Abstraction for Time and State Vulnerabilities},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {40--66},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013040103},
  doi          = {10.4018/JSSE.2013040103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/Corcalciuc13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Crawford13,
  author       = {Jeff Crawford},
  title        = {Assessing the Value of Formal Control Mechanisms on Strong Password
                  Selection},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {1--17},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013070101},
  doi          = {10.4018/JSSE.2013070101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/Crawford13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DubreuilBTL13,
  author       = {Jean Dubreuil and
                  Guillaume Bouffard and
                  Bhagyalekshmy N. Thampi and
                  Jean{-}Louis Lanet},
  title        = {Mitigating Type Confusion on Java Card},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {19--39},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013040102},
  doi          = {10.4018/JSSE.2013040102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/DubreuilBTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KaiyaSOK13,
  author       = {Haruhiko Kaiya and
                  Junya Sakai and
                  Shinpei Ogata and
                  Kenji Kaijiri},
  title        = {Eliciting Security Requirements for an Information System using Asset
                  Flows and Processor Deployment},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {42--63},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013070103},
  doi          = {10.4018/JSSE.2013070103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/KaiyaSOK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MatsunoY13,
  author       = {Yutaka Matsuno and
                  Shuichiro Yamamoto},
  title        = {A New Method for Writing Assurance Cases},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {31--49},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013010103},
  doi          = {10.4018/JSSE.2013010103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MatsunoY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MeadSW13,
  author       = {Nancy R. Mead and
                  Daniel Shoemaker and
                  Carol Woody},
  title        = {Principles and Measurement Models for Software Assurance},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {1--10},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013010101},
  doi          = {10.4018/JSSE.2013010101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MeadSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MelandG13,
  author       = {Per H{\aa}kon Meland and
                  Erlend Andreas Gj{\ae}re},
  title        = {Threat Representation Methods for Composite Service Process Models},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {2},
  pages        = {1--18},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013040101},
  doi          = {10.4018/JSSE.2013040101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MelandG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MillerAGA13,
  author       = {Simon Miller and
                  Susan Appleby and
                  Jonathan M. Garibaldi and
                  Uwe Aickelin},
  title        = {Towards a More Systematic Approach to Secure Systems Design and Analysis},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {11--30},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013010102},
  doi          = {10.4018/JSSE.2013010102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MillerAGA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MurvayG13,
  author       = {Pal{-}Stefan Murvay and
                  Bogdan Groza},
  title        = {Performance Evaluation of {SHA-2} Standard vs. {SHA-3} Finalists on
                  Two Freescale Platforms},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {1--24},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijsse.2013100101},
  doi          = {10.4018/IJSSE.2013100101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MurvayG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/RjaibiRAM13,
  author       = {Neila Rjaibi and
                  Latifa Ben Arfa Rabai and
                  Anis Ben Aissa and
                  Ali Mili},
  title        = {Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity:
                  E-Learning Case Study},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {64--81},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013070104},
  doi          = {10.4018/JSSE.2013070104},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsse/RjaibiRAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/VugrinT13,
  author       = {Eric D. Vugrin and
                  Jennifer Turgeon},
  title        = {Advancing Cyber Resilience Analysis with Performance-Based Metrics
                  from Infrastructure Assessments},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {1},
  pages        = {75--96},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013010105},
  doi          = {10.4018/JSSE.2013010105},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/VugrinT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/WangLRK13,
  author       = {Li Wang and
                  Zheng Li and
                  Shangping Ren and
                  Kevin A. Kwiat},
  title        = {Optimal Voting Strategy against Random and Targeted Attacks},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {25--46},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijsse.2013100102},
  doi          = {10.4018/IJSSE.2013100102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/WangLRK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/WuGS13,
  author       = {Yan Wu and
                  Robin A. Gandhi and
                  Harvey P. Siy},
  title        = {Semi-Automatic Annotation of Natural Language Vulnerability Reports},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {4},
  number       = {3},
  pages        = {18--41},
  year         = {2013},
  url          = {https://doi.org/10.4018/jsse.2013070102},
  doi          = {10.4018/JSSE.2013070102},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsse/WuGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics