Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsse/ijsse1.bht:"
@article{DBLP:journals/ijsse/AdenijiL10, author = {Aderemi O. Adeniji and Seok{-}Won Lee}, title = {Assimilating and Optimizing Software Assurance in the {SDLC:} {A} Framework and Step-Wise Approach}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {4}, pages = {62--80}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010100104}, doi = {10.4018/JSSE.2010100104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/AdenijiL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Bai10, author = {Yun Bai}, title = {A Formal Approach for Securing {XML} Document}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {41--53}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102003}, doi = {10.4018/JSSE.2010102003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Bai10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Barjis10, author = {Joseph Barjis}, title = {Software Engineering Security Based on Business Process Modeling}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {2}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010040101}, doi = {10.4018/JSSE.2010040101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Barjis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/BratusORSL10, author = {Sergey Bratus and James Oakley and Ashwin Ramaswamy and Sean W. Smith and Michael E. Locasto}, title = {Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010070101}, doi = {10.4018/JSSE.2010070101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BratusORSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DaiMK10, author = {Huning Dai and Christian Murphy and Gail E. Kaiser}, title = {{CONFU:} Configuration Fuzzing Testing Framework for Software Vulnerability Detection}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {41--55}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010070103}, doi = {10.4018/JSSE.2010070103}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DaiMK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DoanDMB10, author = {Thuong Doan and Steven A. Demurjian and Laurent Michel and Solomon Berhe}, title = {Integrating Access Control into {UML} for Secure Software Modeling and Analysis}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {1--19}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102001}, doi = {10.4018/JSSE.2010102001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DoanDMB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FailyF10, author = {Shamal Faily and Ivan Flechais}, title = {Towards Tool-Support for Usable Secure Requirements Engineering with {CAIRIS}}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {56--70}, year = {2010}, url = {https://doi.org/10.4018/IJSSE.2010070104}, doi = {10.4018/IJSSE.2010070104}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FailyF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/GirardMHD10, author = {Fr{\'{e}}d{\'{e}}ric Girard and Bertrand Meunier and Duan Hua and Eric Dubois}, title = {A Rigorous Approach to the Definition of an International Vocational Master's Degree in Information Security Management}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {4}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010100101}, doi = {10.4018/JSSE.2010100101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/GirardMHD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KhanH10, author = {Khaled M. Khan and Jun Han}, title = {A Tool Support for Secure Software Integration}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {2}, pages = {35--56}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010040103}, doi = {10.4018/JSSE.2010040103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KhanH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Mead10, author = {Nancy R. Mead}, title = {Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {74--91}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102005}, doi = {10.4018/JSSE.2010102005}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Mead10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MeadAAHKLM10, author = {Nancy R. Mead and Julia H. Allen and Mark A. Ardis and Thomas B. Hilburn and Andrew J. Kornecki and Richard C. Linger and James McDonald}, title = {Development of a Master of Software Assurance Reference Curriculum}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {4}, pages = {18--34}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010100102}, doi = {10.4018/JSSE.2010100102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MeadAAHKLM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/NhlabatsiNY10, author = {Armstrong Nhlabatsi and Bashar Nuseibeh and Yijun Yu}, title = {Security Requirements Engineering for Evolving Software Systems: {A} Survey}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {54--73}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102004}, doi = {10.4018/JSSE.2010102004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/NhlabatsiNY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/NicolaysenSLJ10, author = {Torstein Nicolaysen and Richard Sasson and Maria B. Line and Martin Gilje Jaatun}, title = {Agile Software Development: The Straight and Narrow Path to Secure Software?}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {71--85}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010070105}, doi = {10.4018/JSSE.2010070105}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/NicolaysenSLJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ShahriarZ10, author = {Hossain Shahriar and Mohammad Zulkernine}, title = {Monitoring Buffer Overflow Attacks: {A} Perennial Task}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {3}, pages = {18--40}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010070102}, doi = {10.4018/JSSE.2010070102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ShahriarZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SimpsonSEP10, author = {Joseph J. Simpson and Mary J. Simpson and Barbara Endicott{-}Popovsky and Viatcheslav Popovsky}, title = {Secure Software Education: {A} Contextual Model-Based Approach}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {4}, pages = {35--61}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010100103}, doi = {10.4018/JSSE.2010100103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SimpsonSEP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SunB10, author = {San{-}Tsai Sun and Konstantin Beznosov}, title = {Retrofitting Existing Web Applications with Effective Dynamic Protection Against {SQL} Injection Attacks}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {1}, pages = {20--40}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010102002}, doi = {10.4018/JSSE.2010102002}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SunB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Yee10, author = {George O. M. Yee}, title = {Towards Designing E-Services that Protect Privacy}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {2}, pages = {18--34}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010040102}, doi = {10.4018/JSSE.2010040102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Yee10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/YounanJPE10, author = {Yves Younan and Wouter Joosen and Frank Piessens and Hans Van den Eynden}, title = {Improving Memory Management Security for {C} and {C++}}, journal = {Int. J. Secur. Softw. Eng.}, volume = {1}, number = {2}, pages = {57--82}, year = {2010}, url = {https://doi.org/10.4018/jsse.2010040104}, doi = {10.4018/JSSE.2010040104}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/YounanJPE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.