BibTeX records: Ju An Wang

download as .bib file

@article{DBLP:journals/isem/WangGWZ12,
  author       = {Ju An Wang and
                  Minzhe Guo and
                  Hao Wang and
                  Linfeng Zhou},
  title        = {Measuring and ranking attacks based on vulnerability analysis},
  journal      = {Inf. Syst. {E} Bus. Manag.},
  volume       = {10},
  number       = {4},
  pages        = {455--490},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10257-011-0173-5},
  doi          = {10.1007/S10257-011-0173-5},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isem/WangGWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/WangGC10,
  author       = {Ju An Wang and
                  Michael M. Guo and
                  Jairo Camargo},
  title        = {An Ontological Approach to Computer System Security},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {19},
  number       = {2},
  pages        = {61--73},
  year         = {2010},
  url          = {https://doi.org/10.1080/19393550903404902},
  doi          = {10.1080/19393550903404902},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/WangGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WangG10,
  author       = {Ju An Wang and
                  Minzhe Guo},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Vulnerability categorization using Bayesian networks},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {29},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852699},
  doi          = {10.1145/1852666.1852699},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WangG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/Joshi-AcharyaW10,
  author       = {Rajib Joshi{-}Acharya and
                  Ju An Wang},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {A Trust Borkerage Framework for Cloud Computing},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {665--671},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 11:46:08 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/Joshi-AcharyaW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WangWGZC10,
  author       = {Ju An Wang and
                  Hao Wang and
                  Minzhe Guo and
                  Linfeng Zhou and
                  Jairo Camargo},
  title        = {Ranking Attacks Based on Vulnerability Analysis},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.313},
  doi          = {10.1109/HICSS.2010.313},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WangWGZC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WangZGWC10,
  author       = {Ju An Wang and
                  Linfeng Zhou and
                  Minzhe Guo and
                  Hao Wang and
                  Jairo Camargo},
  title        = {Measuring Similarity for Security Vulnerabilities},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.269},
  doi          = {10.1109/HICSS.2010.269},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WangZGWC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic/BoppidiNWP10,
  author       = {Chandrakanth Boppidi and
                  Nurun Nahar and
                  Ju An Wang and
                  Svetlana Peltsverger},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy and
                  Joan Lu and
                  Andy Marsh and
                  Ashu M. G. Solo},
  title        = {Remotely Accessed Hardware Laboratory Infrastructure},
  booktitle    = {Proceedings of the 2010 International Conference on Internet Computing,
                  {ICOMP} 2010, July 12-15, 2010, Las Vegas Nevada, {USA}},
  pages        = {318--323},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Tue, 07 Dec 2010 14:03:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ic/BoppidiNWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/WangWGX09,
  author       = {Ju An Wang and
                  Hao Wang and
                  Minzhe Guo and
                  Min Xia},
  editor       = {John D. McGregor},
  title        = {Security metrics for software systems},
  booktitle    = {Proceedings of the 47th Annual Southeast Regional Conference, 2009,
                  Clemson, South Carolina, USA, March 19-21, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1566445.1566509},
  doi          = {10.1145/1566445.1566509},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ACMse/WangWGX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WangGWXZ09,
  author       = {Ju An Wang and
                  Minzhe Guo and
                  Hao Wang and
                  Min Xia and
                  Linfeng Zhou},
  editor       = {Frederick T. Sheldon and
                  Greg Peterson and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Ontology-based security assessment for software products},
  booktitle    = {Fifth Cyber Security and Information Intelligence Research Workshop,
                  {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009},
  pages        = {15},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1558607.1558625},
  doi          = {10.1145/1558607.1558625},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WangGWXZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WangG09,
  author       = {Ju An Wang and
                  Minzhe Guo},
  editor       = {Frederick T. Sheldon and
                  Greg Peterson and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {{OVM:} an ontology for vulnerability management},
  booktitle    = {Fifth Cyber Security and Information Intelligence Research Workshop,
                  {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009},
  pages        = {34},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1558607.1558646},
  doi          = {10.1145/1558607.1558646},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WangG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcbs/WangG09,
  author       = {Ju An Wang and
                  Minzhe Guo},
  editor       = {Joe Zhang and
                  Guo{-}Zheng Li and
                  Jack Y. Yang},
  title        = {Security Data Mining in an Ontology for Vulnerability Management},
  booktitle    = {International Joint Conferences on Bioinformatics, Systems Biology
                  and Intelligent Computing, {IJCBS} 2009, Shanghai, China, 3-5 August
                  2009},
  pages        = {597--603},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IJCBS.2009.13},
  doi          = {10.1109/IJCBS.2009.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcbs/WangG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssiri/WangGWXZ09,
  author       = {Ju An Wang and
                  Minzhe Guo and
                  Hao Wang and
                  Min Xia and
                  Linfeng Zhou},
  title        = {Environmental Metrics for Software Security Based on a Vulnerability
                  Ontology},
  booktitle    = {Third {IEEE} International Conference on Secure Software Integration
                  and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10,
                  2009},
  pages        = {159--168},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SSIRI.2009.60},
  doi          = {10.1109/SSIRI.2009.60},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ssiri/WangGWXZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/WangZX08,
  author       = {Ju An Wang and
                  Fengwei Zhang and
                  Min Xia},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Temporal metrics for software vulnerabilities},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {44:1--44:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413191},
  doi          = {10.1145/1413140.1413191},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/WangZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webnet/Wang97,
  author       = {Ju An Wang},
  editor       = {Suave Lobodzinski and
                  Ivan Tomek},
  title        = {{WASE:} Towards a Web-Aided Software Engineering},
  booktitle    = {Proceedings of WebNet 97 - World Conference on the WWW, Internet {\&}
                  Intranet, Toronto, Canada, November 1-5, 1997},
  publisher    = {{AACE}},
  year         = {1997},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/webnet/Wang97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics