BibTeX records: Robin A. Gandhi

download as .bib file

@inproceedings{DBLP:conf/csiirw/GrandgenettMG15,
  author    = {Ryan Grandgenett and
               William R. Mahoney and
               Robin A. Gandhi},
  title     = {Authentication Bypass and Remote Escalated {I/O} Command Attacks},
  booktitle = {Proceedings of the 10th Annual Cyber and Information Security Research
               Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  pages     = {2:1--2:7},
  year      = {2015},
  crossref  = {DBLP:conf/csiirw/2015},
  url       = {http://doi.acm.org/10.1145/2746266.2746268},
  doi       = {10.1145/2746266.2746268},
  timestamp = {Tue, 30 Jun 2015 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/csiirw/GrandgenettMG15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/re/MandalGS15,
  author    = {Sayonnha Mandal and
               Robin A. Gandhi and
               Harvey P. Siy},
  title     = {Semantic web representations for reasoning about applicability and
               satisfiability of federal regulations for information security},
  booktitle = {Eighth {IEEE} International Workshop on Requirements Engineering and
               Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015},
  pages     = {1--9},
  year      = {2015},
  crossref  = {DBLP:conf/re/2015relaw},
  url       = {http://doi.ieeecomputersociety.org/10.1109/RELAW.2015.7330205},
  doi       = {10.1109/RELAW.2015.7330205},
  timestamp = {Mon, 09 May 2016 13:04:36 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/re/MandalGS15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/computer/GandhiCSM14,
  author    = {Robin A. Gandhi and
               Keesha Crosby and
               Harvey P. Siy and
               Sayonnha Mandal},
  title     = {Gauging the Impact of {FISMA} on Software Security},
  journal   = {{IEEE} Computer},
  volume    = {47},
  number    = {9},
  pages     = {103--107},
  year      = {2014},
  url       = {https://doi.org/10.1109/MC.2014.248},
  doi       = {10.1109/MC.2014.248},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/computer/GandhiCSM14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijics/SharmaGZMS13,
  author    = {Anup C. Sharma and
               Robin A. Gandhi and
               Qiuming Zhu and
               William R. Mahoney and
               William L. Sousan},
  title     = {A social dimensional cyber threat model with formal concept analysis
               and fact-proposition inference},
  journal   = {{IJICS}},
  volume    = {5},
  number    = {4},
  pages     = {301--333},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJICS.2013.058213},
  doi       = {10.1504/IJICS.2013.058213},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijics/SharmaGZMS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijsse/WuGS13,
  author    = {Yan Wu and
               Robin A. Gandhi and
               Harvey P. Siy},
  title     = {Semi-Automatic Annotation of Natural Language Vulnerability Reports},
  journal   = {{IJSSE}},
  volume    = {4},
  number    = {3},
  pages     = {18--41},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013070102},
  doi       = {10.4018/jsse.2013070102},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijsse/WuGS13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/GandhiSW13,
  author    = {Robin A. Gandhi and
               Harvey P. Siy and
               Yan Wu},
  title     = {Lightweight formal models of software weaknesses},
  booktitle = {1st {FME} Workshop on Formal Methods in Software Engineering, FormaliSE
               2013, San Francisco, CA, USA, May 25, 2013},
  pages     = {50--56},
  year      = {2013},
  crossref  = {DBLP:conf/icse/2013formalise},
  url       = {https://doi.org/10.1109/FormaliSE.2013.6612277},
  doi       = {10.1109/FormaliSE.2013.6612277},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/GandhiSW13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/inroads/MahoneyG12,
  author    = {William R. Mahoney and
               Robin A. Gandhi},
  title     = {Reverse engineering: \emph{is it art?}},
  journal   = {Inroads},
  volume    = {3},
  number    = {1},
  pages     = {56--61},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2077808.2077826},
  doi       = {10.1145/2077808.2077826},
  timestamp = {Fri, 22 May 2015 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/inroads/MahoneyG12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/inroads/GandhiJM12,
  author    = {Robin A. Gandhi and
               Connie Jones and
               William R. Mahoney},
  title     = {A freshman level course on information assurance: can it be done?
               \emph{here's how}},
  journal   = {Inroads},
  volume    = {3},
  number    = {3},
  pages     = {50--61},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2339055.2339072},
  doi       = {10.1145/2339055.2339072},
  timestamp = {Fri, 22 May 2015 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/inroads/GandhiJM12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/re/GandhiR12,
  author    = {Robin A. Gandhi and
               Mariam Rahmani},
  title     = {Early security patterns: {A} collection of constraints to describe
               regulatory security requirements},
  booktitle = {Second {IEEE} International Workshop on Requirements Patterns, RePa
               2012, Chicago, IL, USA, September 24, 2012},
  pages     = {17--22},
  year      = {2012},
  crossref  = {DBLP:conf/re/2012repa},
  url       = {https://doi.org/10.1109/RePa.2012.6359966},
  doi       = {10.1109/RePa.2012.6359966},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/re/GandhiR12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijcip/MahoneyG11,
  author    = {William R. Mahoney and
               Robin A. Gandhi},
  title     = {An integrated framework for control system simulation and regulatory
               compliance monitoring},
  journal   = {{IJCIP}},
  volume    = {4},
  number    = {1},
  pages     = {41--53},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ijcip.2011.03.002},
  doi       = {10.1016/j.ijcip.2011.03.002},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijcip/MahoneyG11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tasm/GandhiSMSZL11,
  author    = {Robin A. Gandhi and
               Anup C. Sharma and
               William R. Mahoney and
               William L. Sousan and
               Qiuming Zhu and
               Phillip A. Laplante},
  title     = {Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political},
  journal   = {{IEEE} Technol. Soc. Mag.},
  volume    = {30},
  number    = {1},
  pages     = {28--38},
  year      = {2011},
  url       = {https://doi.org/10.1109/MTS.2011.940293},
  doi       = {10.1109/MTS.2011.940293},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/tasm/GandhiSMSZL11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/tosem/GandhiL11,
  author    = {Robin A. Gandhi and
               Seok Won Lee},
  title     = {Discovering Multidimensional Correlations among Regulatory Requirements
               to Understand Risk},
  journal   = {{ACM} Trans. Softw. Eng. Methodol.},
  volume    = {20},
  number    = {4},
  pages     = {16:1--16:37},
  year      = {2011},
  url       = {http://doi.acm.org/10.1145/2000799.2000802},
  doi       = {10.1145/2000799.2000802},
  timestamp = {Tue, 03 Jan 2017 00:00:00 +0100},
  biburl    = {http://dblp.org/rec/bib/journals/tosem/GandhiL11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SousanGZM11,
  author    = {William L. Sousan and
               Robin A. Gandhi and
               Qiuming Zhu and
               William R. Mahoney},
  title     = {Using anomalous event patterns in control systems for tamper detection},
  booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence
               Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
               2011},
  pages     = {26},
  year      = {2011},
  crossref  = {DBLP:conf/csiirw/2011},
  url       = {http://doi.acm.org/10.1145/2179298.2179326},
  doi       = {10.1145/2179298.2179326},
  timestamp = {Thu, 10 Jan 2013 09:44:12 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/csiirw/SousanGZM11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/WuSG11,
  author    = {Yan Wu and
               Harvey P. Siy and
               Robin A. Gandhi},
  title     = {Empirical results on the study of software vulnerabilities},
  booktitle = {Proceedings of the 33rd International Conference on Software Engineering,
               {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011},
  pages     = {964--967},
  year      = {2011},
  crossref  = {DBLP:conf/icse/2011},
  url       = {http://doi.acm.org/10.1145/1985793.1985960},
  doi       = {10.1145/1985793.1985960},
  timestamp = {Wed, 01 Apr 2015 20:06:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/WuSG11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/WuGS10,
  author    = {Yan Wu and
               Robin A. Gandhi and
               Harvey P. Siy},
  title     = {Using semantic templates to study vulnerabilities recorded in large
               software repositories},
  booktitle = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
               2010, May 2, 2010, Cape Town, South Africa},
  pages     = {22--28},
  year      = {2010},
  crossref  = {DBLP:conf/icse/2010sess},
  url       = {http://doi.acm.org/10.1145/1809100.1809104},
  doi       = {10.1145/1809100.1809104},
  timestamp = {Tue, 01 Jul 2014 16:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/WuGS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/WalenzGMZ10,
  author    = {Brett Walenz and
               Robin A. Gandhi and
               William R. Mahoney and
               Qiuming Zhu},
  title     = {Exploring Social Contexts along the Time Dimension: Temporal Analysis
               of Named Entities},
  booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  pages     = {508--512},
  year      = {2010},
  crossref  = {DBLP:conf/socialcom/2010},
  url       = {https://doi.org/10.1109/SocialCom.2010.80},
  doi       = {10.1109/SocialCom.2010.80},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/socialcom/WalenzGMZ10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/SousanZGMS10,
  author    = {William L. Sousan and
               Qiuming Zhu and
               Robin A. Gandhi and
               William R. Mahoney and
               Anup C. Sharma},
  title     = {Using Term Extraction Patterns to Discover Coherent Relationships
               from Open Source Intelligence},
  booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  pages     = {967--972},
  year      = {2010},
  crossref  = {DBLP:conf/socialcom/2010},
  url       = {https://doi.org/10.1109/SocialCom.2010.143},
  doi       = {10.1109/SocialCom.2010.143},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/socialcom/SousanZGMS10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/SharmaGMSZ10,
  author    = {Anup C. Sharma and
               Robin A. Gandhi and
               William R. Mahoney and
               William L. Sousan and
               Qiuming Zhu},
  title     = {Building a Social Dimensional Threat Model from Current and Historic
               Events of Cyber Attacks},
  booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  pages     = {981--986},
  year      = {2010},
  crossref  = {DBLP:conf/socialcom/2010},
  url       = {https://doi.org/10.1109/SocialCom.2010.145},
  doi       = {10.1109/SocialCom.2010.145},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/socialcom/SharmaGMSZ10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:reference/se/LeeGP10,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Sooyong Park},
  title     = {Requirements: Tracing},
  booktitle = {Encyclopedia of Software Engineering},
  pages     = {999--1011},
  year      = {2010},
  crossref  = {DBLP:reference/se/2010},
  url       = {http://www.crcnetbase.com/doi/abs/10.1081/E-ESE-120044209},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/reference/se/LeeGP10},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijseke/LeeGW09,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Siddharth J. Wagle},
  title     = {Ontology-Guided Service-Oriented Architecture Composition to Support
               Complex and Tailorable Process Definitions},
  journal   = {International Journal of Software Engineering and Knowledge Engineering},
  volume    = {19},
  number    = {6},
  pages     = {791--821},
  year      = {2009},
  url       = {https://doi.org/10.1142/S0218194009004386},
  doi       = {10.1142/S0218194009004386},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijseke/LeeGW09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/refsq/GandhiL09,
  author    = {Robin A. Gandhi and
               Seok Won Lee},
  title     = {Assurance Case Driven Case Study Design for Requirements Engineering
               Research},
  booktitle = {Requirements Engineering: Foundation for Software Quality, 15th International
               Working Conference, {REFSQ} 2009, Amsterdam, The Netherlands, June
               8-9, 2009, Proceedings},
  pages     = {190--196},
  year      = {2009},
  crossref  = {DBLP:conf/refsq/2009},
  url       = {https://doi.org/10.1007/978-3-642-02050-6_16},
  doi       = {10.1007/978-3-642-02050-6_16},
  timestamp = {Wed, 17 May 2017 14:24:28 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/refsq/GandhiL09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@incollection{DBLP:series/sci/GandhiL09,
  author    = {Robin A. Gandhi and
               Seok Won Lee},
  title     = {Ontology Guided Risk Analysis: From Informal Specifications to Formal
               Metrics},
  booktitle = {Advances in Information and Intelligent Systems},
  pages     = {227--249},
  year      = {2009},
  crossref  = {DBLP:series/sci/2009-251},
  url       = {https://doi.org/10.1007/978-3-642-04141-9_11},
  doi       = {10.1007/978-3-642-04141-9_11},
  timestamp = {Tue, 16 May 2017 14:24:36 +0200},
  biburl    = {http://dblp.org/rec/bib/series/sci/GandhiL09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sopr/LeeGA07,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Gail{-}Joon Ahn},
  title     = {Certification process artifacts defined as measurable units for software
               assurance},
  journal   = {Software Process: Improvement and Practice},
  volume    = {12},
  number    = {2},
  pages     = {165--189},
  year      = {2007},
  url       = {https://doi.org/10.1002/spip.313},
  doi       = {10.1002/spip.313},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/sopr/LeeGA07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGW07,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Siddharth J. Wagle},
  title     = {Towards a Requirements-Driven Workbench for Supporting Software Certification
               and Accreditation},
  booktitle = {Third International Workshop on Software Engineering for Secure Systems,
               {SESS} 2007, Minneapolis, MN, USA, May 20-26, 2007},
  pages     = {8},
  year      = {2007},
  crossref  = {DBLP:conf/icse/2007sess},
  url       = {https://doi.org/10.1109/SESS.2007.11},
  doi       = {10.1109/SESS.2007.11},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/LeeGW07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/re/GandhiL07,
  author    = {Robin A. Gandhi and
               Seok Won Lee},
  title     = {Discovering and Understanding Multi-dimensional Correlations among
               Certification Requirements with application to Risk Assessment},
  booktitle = {15th {IEEE} International Requirements Engineering Conference, {RE}
               2007, October 15-19th, 2007, New Delhi, India},
  pages     = {231--240},
  year      = {2007},
  crossref  = {DBLP:conf/re/2007},
  url       = {https://doi.org/10.1109/RE.2007.46},
  doi       = {10.1109/RE.2007.46},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/re/GandhiL07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/re/LeeGWM07,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Siddharth J. Wagle and
               Ajeet B. Murty},
  title     = {r-AnalytiCA: Requirements Analytics for Certification {\&} Accreditation},
  booktitle = {15th {IEEE} International Requirements Engineering Conference, {RE}
               2007, October 15-19th, 2007, New Delhi, India},
  pages     = {383--384},
  year      = {2007},
  crossref  = {DBLP:conf/re/2007},
  url       = {https://doi.org/10.1109/RE.2007.34},
  doi       = {10.1109/RE.2007.34},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/re/LeeGWM07},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/ijseke/LeeMGYA06,
  author    = {Seok Won Lee and
               Divya Muthurajan and
               Robin A. Gandhi and
               Deepak S. Yavagal and
               Gail{-}Joon Ahn},
  title     = {Building Decision Support Problem Domain Ontology from Natural Language
               Requirements for Software Assurance},
  journal   = {International Journal of Software Engineering and Knowledge Engineering},
  volume    = {16},
  number    = {6},
  pages     = {851--884},
  year      = {2006},
  url       = {https://doi.org/10.1142/S0218194006003051},
  doi       = {10.1142/S0218194006003051},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/ijseke/LeeMGYA06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGMYA06,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Divya Muthurajan and
               Deepak S. Yavagal and
               Gail{-}Joon Ahn},
  title     = {Building problem domain ontology from security requirements in regulatory
               documents},
  booktitle = {Proceedings of the 2006 international workshop on Software engineering
               for secure systems, {SESS} 2006, Shanghai, China, May 20-21, 2006},
  pages     = {43--50},
  year      = {2006},
  crossref  = {DBLP:conf/icse/2006sess},
  url       = {http://doi.acm.org/10.1145/1137627.1137635},
  doi       = {10.1145/1137627.1137635},
  timestamp = {Thu, 13 Aug 2015 15:06:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/LeeGMYA06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/re/RichterGLL06,
  author    = {Heather Richter and
               Robin A. Gandhi and
               Lei Liu and
               Seok Won Lee},
  title     = {Incorporating Multimedia Source Materials into a Traceability Framework},
  booktitle = {2006 First International Workshop on Multimedia Requirements Engineering,
               {MERE} 2006, Minnneapolis, MN, USA, September 12, 2006},
  pages     = {7},
  year      = {2006},
  crossref  = {DBLP:conf/re/2006mere},
  url       = {https://doi.org/10.1109/MERE.2006.3},
  doi       = {10.1109/MERE.2006.3},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/re/RichterGLL06},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@article{DBLP:journals/sigsoft/LeeGA05,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Gail{-}Joon Ahn},
  title     = {Establishing trustworthiness in services of the critical infrastructure
               through certification and accreditation},
  journal   = {{ACM} {SIGSOFT} Software Engineering Notes},
  volume    = {30},
  number    = {4},
  pages     = {1--7},
  year      = {2005},
  url       = {http://doi.acm.org/10.1145/1082983.1083205},
  doi       = {10.1145/1082983.1083205},
  timestamp = {Thu, 08 May 2008 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/journals/sigsoft/LeeGA05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/YavagalLAG05,
  author    = {Deepak S. Yavagal and
               Seok Won Lee and
               Gail{-}Joon Ahn and
               Robin A. Gandhi},
  title     = {Common criteria requirements modeling and its uses for quality of
               information assurance (QoIA)},
  booktitle = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005,
               Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2},
  pages     = {130--135},
  year      = {2005},
  crossref  = {DBLP:conf/ACMse/2005-2},
  url       = {http://doi.acm.org/10.1145/1167253.1167287},
  doi       = {10.1145/1167253.1167287},
  timestamp = {Mon, 15 Jun 2015 19:00:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ACMse/YavagalLAG05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/apsec/LeeG05,
  author    = {Seok Won Lee and
               Robin A. Gandhi},
  title     = {Ontology-based Active Requirements Engineering Framework},
  booktitle = {12th Asia-Pacific Software Engineering Conference {(APSEC} 2005),
               15-17 December 2005, Taipei, Taiwan},
  pages     = {481--490},
  year      = {2005},
  crossref  = {DBLP:conf/apsec/2005},
  url       = {https://doi.org/10.1109/APSEC.2005.86},
  doi       = {10.1109/APSEC.2005.86},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/apsec/LeeG05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGA05,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Gail{-}Joon Ahn},
  title     = {Establishing trustworthiness in services of the critical infrastructure
               through certification and accreditation},
  booktitle = {Proceedings of the 2005 Workshop on Software Engineering for Secure
               Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis,
               Missouri, USA, May 15-16, 2005},
  pages     = {1--7},
  year      = {2005},
  crossref  = {DBLP:conf/icse/2005sess},
  url       = {http://doi.acm.org/10.1145/1083200.1083205},
  doi       = {10.1145/1083200.1083205},
  timestamp = {Thu, 13 Aug 2015 15:01:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/LeeGA05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeeGAY05,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Gail{-}Joon Ahn and
               Deepak S. Yavagal},
  title     = {Active Automation of the {DITSCAP}},
  booktitle = {Intelligence and Security Informatics, {IEEE} International Conference
               on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
               USA, May 19-20, 2005, Proceedings},
  pages     = {479--485},
  year      = {2005},
  crossref  = {DBLP:conf/isi/2005},
  url       = {https://doi.org/10.1007/11427995_46},
  doi       = {10.1007/11427995_46},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isi/LeeGAY05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{DBLP:conf/smc/ToloneGA03,
  author    = {William J. Tolone and
               Robin A. Gandhi and
               Gail{-}Joon Ahn},
  title     = {Locale-based access control: placing collaborative authorization decisions
               in context},
  booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man
               {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  pages     = {4120--4127},
  year      = {2003},
  crossref  = {DBLP:conf/smc/2003},
  url       = {https://doi.org/10.1109/ICSMC.2003.1245632},
  doi       = {10.1109/ICSMC.2003.1245632},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/smc/ToloneGA03},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2015,
  editor    = {Joseph P. Trien and
               Stacy J. Prowell and
               Robert A. Bridges and
               John R. Goodall},
  title     = {Proceedings of the 10th Annual Cyber and Information Security Research
               Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2746266},
  isbn      = {978-1-4503-3345-0},
  timestamp = {Wed, 17 Jun 2015 09:34:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/csiirw/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/re/2015relaw,
  title     = {Eighth {IEEE} International Workshop on Requirements Engineering and
               Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7324163},
  isbn      = {978-1-5090-0104-0},
  timestamp = {Mon, 09 May 2016 13:04:36 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/re/2015relaw},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2013formalise,
  title     = {1st {FME} Workshop on Formal Methods in Software Engineering, FormaliSE
               2013, San Francisco, CA, USA, May 25, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6596468},
  isbn      = {978-1-4673-6292-4},
  timestamp = {Fri, 07 Aug 2015 14:51:34 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/2013formalise},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/re/2012repa,
  title     = {Second {IEEE} International Workshop on Requirements Patterns, RePa
               2012, Chicago, IL, USA, September 24, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6338383},
  isbn      = {978-1-4673-4374-9},
  timestamp = {Wed, 05 Dec 2012 15:48:44 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/re/2012repa},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2011,
  editor    = {Frederick T. Sheldon and
               Robert K. Abercrombie and
               Axel W. Krings},
  title     = {Proceedings of the 7th Cyber Security and Information Intelligence
               Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
               2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2179298},
  isbn      = {978-1-4503-0945-5},
  timestamp = {Thu, 10 Jan 2013 09:44:12 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/csiirw/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2011,
  editor    = {Richard N. Taylor and
               Harald C. Gall and
               Nenad Medvidovic},
  title     = {Proceedings of the 33rd International Conference on Software Engineering,
               {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0445-0},
  timestamp = {Wed, 01 Apr 2015 20:06:21 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2010sess,
  editor    = {Seok{-}Won Lee and
               Mattia Monga and
               Jan J{\"{u}}rjens},
  title     = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
               2010, May 2, 2010, Cape Town, South Africa},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1809100},
  isbn      = {978-1-60558-965-7},
  timestamp = {Tue, 01 Jul 2014 16:01:06 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/2010sess},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/socialcom/2010,
  editor    = {Ahmed K. Elmagarmid and
               Divyakant Agrawal},
  title     = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5590331},
  isbn      = {978-0-7695-4211-9},
  timestamp = {Fri, 28 Aug 2015 14:17:17 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/socialcom/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:reference/se/2010,
  editor    = {Phillip A. Laplante},
  title     = {Encyclopedia of Software Engineering},
  publisher = {Taylor {\&} Francis},
  year      = {2010},
  isbn      = {978-1-4200-5977-9},
  timestamp = {Fri, 25 Nov 2011 17:51:57 +0100},
  biburl    = {http://dblp.org/rec/bib/reference/se/2010},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/refsq/2009,
  editor    = {Martin Glinz and
               Patrick Heymans},
  title     = {Requirements Engineering: Foundation for Software Quality, 15th International
               Working Conference, {REFSQ} 2009, Amsterdam, The Netherlands, June
               8-9, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5512},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02050-6},
  doi       = {10.1007/978-3-642-02050-6},
  isbn      = {978-3-642-02049-0},
  timestamp = {Wed, 17 May 2017 14:24:28 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/refsq/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@book{DBLP:series/sci/2009-251,
  editor    = {Zbigniew W. Ras and
               William Ribarsky},
  title     = {Advances in Information and Intelligent Systems},
  series    = {Studies in Computational Intelligence},
  volume    = {251},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04141-9},
  doi       = {10.1007/978-3-642-04141-9},
  isbn      = {978-3-642-04140-2},
  timestamp = {Tue, 16 May 2017 14:24:36 +0200},
  biburl    = {http://dblp.org/rec/bib/series/sci/2009-251},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2007sess,
  title     = {Third International Workshop on Software Engineering for Secure Systems,
               {SESS} 2007, Minneapolis, MN, USA, May 20-26, 2007},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4273323},
  isbn      = {0-7695-2952-6},
  timestamp = {Tue, 11 Aug 2015 10:20:19 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/2007sess},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/re/2007,
  title     = {15th {IEEE} International Requirements Engineering Conference, {RE}
               2007, October 15-19th, 2007, New Delhi, India},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4384149},
  isbn      = {0-7695-2935-6},
  timestamp = {Tue, 30 Sep 2014 17:11:25 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/re/2007},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2006sess,
  editor    = {Danilo Bruschi and
               Bart De Win and
               Mattia Monga},
  title     = {Proceedings of the 2006 international workshop on Software engineering
               for secure systems, {SESS} 2006, Shanghai, China, May 20-21, 2006},
  publisher = {{ACM}},
  year      = {2006},
  url       = {http://dl.acm.org/citation.cfm?id=1137627},
  isbn      = {1-59593-411-1},
  timestamp = {Thu, 13 Aug 2015 15:06:10 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/2006sess},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/re/2006mere,
  editor    = {Oliver Creighton and
               Bernd Bruegge},
  title     = {2006 First International Workshop on Multimedia Requirements Engineering,
               {MERE} 2006, Minnneapolis, MN, USA, September 12, 2006},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4022116},
  isbn      = {0-7695-2713-2},
  timestamp = {Mon, 09 May 2016 14:16:23 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/re/2006mere},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ACMse/2005-2,
  editor    = {M{\'{a}}rio Guimar{\~{a}}es},
  title     = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005,
               Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2},
  publisher = {{ACM}},
  year      = {2005},
  timestamp = {Mon, 15 Jun 2015 19:00:08 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/ACMse/2005-2},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/apsec/2005,
  title     = {12th Asia-Pacific Software Engineering Conference {(APSEC} 2005),
               15-17 December 2005, Taipei, Taiwan},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10689},
  isbn      = {0-7695-2465-6},
  timestamp = {Tue, 25 Nov 2014 17:05:18 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/apsec/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/icse/2005sess,
  title     = {Proceedings of the 2005 Workshop on Software Engineering for Secure
               Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis,
               Missouri, USA, May 15-16, 2005},
  publisher = {{ACM}},
  year      = {2005},
  url       = {http://dl.acm.org/citation.cfm?id=1083200},
  isbn      = {1-59593-114-7},
  timestamp = {Thu, 13 Aug 2015 15:01:14 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/icse/2005sess},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/isi/2005,
  editor    = {Paul B. Kantor and
               Gheorghe Muresan and
               Fred S. Roberts and
               Daniel Dajun Zeng and
               Fei{-}Yue Wang and
               Hsinchun Chen and
               Ralph C. Merkle},
  title     = {Intelligence and Security Informatics, {IEEE} International Conference
               on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
               USA, May 19-20, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3495},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b136511},
  doi       = {10.1007/b136511},
  isbn      = {3-540-25999-6},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {http://dblp.org/rec/bib/conf/isi/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/smc/2003,
  title     = {Proceedings of the {IEEE} International Conference on Systems, Man
               {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8811},
  isbn      = {0-7803-7952-7},
  timestamp = {Thu, 05 Dec 2013 17:22:20 +0100},
  biburl    = {http://dblp.org/rec/bib/conf/smc/2003},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier