Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ju An Wang
@article{DBLP:journals/isem/WangGWZ12, author = {Ju An Wang and Minzhe Guo and Hao Wang and Linfeng Zhou}, title = {Measuring and ranking attacks based on vulnerability analysis}, journal = {Inf. Syst. {E} Bus. Manag.}, volume = {10}, number = {4}, pages = {455--490}, year = {2012}, url = {https://doi.org/10.1007/s10257-011-0173-5}, doi = {10.1007/S10257-011-0173-5}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isem/WangGWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/WangGC10, author = {Ju An Wang and Michael M. Guo and Jairo Camargo}, title = {An Ontological Approach to Computer System Security}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {19}, number = {2}, pages = {61--73}, year = {2010}, url = {https://doi.org/10.1080/19393550903404902}, doi = {10.1080/19393550903404902}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/WangGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WangG10, author = {Ju An Wang and Minzhe Guo}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Vulnerability categorization using Bayesian networks}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {29}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852699}, doi = {10.1145/1852666.1852699}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WangG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/Joshi-AcharyaW10, author = {Rajib Joshi{-}Acharya and Ju An Wang}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {A Trust Borkerage Framework for Cloud Computing}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {665--671}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/Joshi-AcharyaW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WangWGZC10, author = {Ju An Wang and Hao Wang and Minzhe Guo and Linfeng Zhou and Jairo Camargo}, title = {Ranking Attacks Based on Vulnerability Analysis}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.313}, doi = {10.1109/HICSS.2010.313}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WangWGZC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/WangZGWC10, author = {Ju An Wang and Linfeng Zhou and Minzhe Guo and Hao Wang and Jairo Camargo}, title = {Measuring Similarity for Security Vulnerabilities}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.269}, doi = {10.1109/HICSS.2010.269}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/WangZGWC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic/BoppidiNWP10, author = {Chandrakanth Boppidi and Nurun Nahar and Ju An Wang and Svetlana Peltsverger}, editor = {Hamid R. Arabnia and Victor A. Clincy and Joan Lu and Andy Marsh and Ashu M. G. Solo}, title = {Remotely Accessed Hardware Laboratory Infrastructure}, booktitle = {Proceedings of the 2010 International Conference on Internet Computing, {ICOMP} 2010, July 12-15, 2010, Las Vegas Nevada, {USA}}, pages = {318--323}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Tue, 07 Dec 2010 14:03:46 +0100}, biburl = {https://dblp.org/rec/conf/ic/BoppidiNWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ACMse/WangWGX09, author = {Ju An Wang and Hao Wang and Minzhe Guo and Min Xia}, editor = {John D. McGregor}, title = {Security metrics for software systems}, booktitle = {Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1566445.1566509}, doi = {10.1145/1566445.1566509}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ACMse/WangWGX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WangGWXZ09, author = {Ju An Wang and Minzhe Guo and Hao Wang and Min Xia and Linfeng Zhou}, editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Ontology-based security assessment for software products}, booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, pages = {15}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1558607.1558625}, doi = {10.1145/1558607.1558625}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WangGWXZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WangG09, author = {Ju An Wang and Minzhe Guo}, editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {{OVM:} an ontology for vulnerability management}, booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, pages = {34}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1558607.1558646}, doi = {10.1145/1558607.1558646}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WangG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcbs/WangG09, author = {Ju An Wang and Minzhe Guo}, editor = {Joe Zhang and Guo{-}Zheng Li and Jack Y. Yang}, title = {Security Data Mining in an Ontology for Vulnerability Management}, booktitle = {International Joint Conferences on Bioinformatics, Systems Biology and Intelligent Computing, {IJCBS} 2009, Shanghai, China, 3-5 August 2009}, pages = {597--603}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IJCBS.2009.13}, doi = {10.1109/IJCBS.2009.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcbs/WangG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/WangGWXZ09, author = {Ju An Wang and Minzhe Guo and Hao Wang and Min Xia and Linfeng Zhou}, title = {Environmental Metrics for Software Security Based on a Vulnerability Ontology}, booktitle = {Third {IEEE} International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10, 2009}, pages = {159--168}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SSIRI.2009.60}, doi = {10.1109/SSIRI.2009.60}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/WangGWXZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WangZX08, author = {Ju An Wang and Fengwei Zhang and Min Xia}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Temporal metrics for software vulnerabilities}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {44:1--44:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413191}, doi = {10.1145/1413140.1413191}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WangZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webnet/Wang97, author = {Ju An Wang}, editor = {Suave Lobodzinski and Ivan Tomek}, title = {{WASE:} Towards a Web-Aided Software Engineering}, booktitle = {Proceedings of WebNet 97 - World Conference on the WWW, Internet {\&} Intranet, Toronto, Canada, November 1-5, 1997}, publisher = {{AACE}}, year = {1997}, timestamp = {Sat, 07 Sep 2019 11:59:24 +0200}, biburl = {https://dblp.org/rec/conf/webnet/Wang97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.