BibTeX records: Robin A. Gandhi

download as .bib file

@inproceedings{DBLP:conf/dasc/MandalGS17,
  author    = {Sayonnha Mandal and
               Robin A. Gandhi and
               Harvey P. Siy},
  title     = {Modular Norm Models: {A} Lightweight Approach for Modeling and Reasoning
               about Legal Compliance},
  booktitle = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
               15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf
               on Big Data Intelligence and Computing and Cyber Science and Technology
               Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA,
               November 6-10, 2017},
  pages     = {657--662},
  year      = {2017},
  crossref  = {DBLP:conf/dasc/2017},
  url       = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.115},
  doi       = {10.1109/DASC-PICom-DataCom-CyberSciTec.2017.115},
  timestamp = {Mon, 23 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dasc/MandalGS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/GrandgenettMG15,
  author    = {Ryan Grandgenett and
               William R. Mahoney and
               Robin A. Gandhi},
  title     = {Authentication Bypass and Remote Escalated {I/O} Command Attacks},
  booktitle = {Proceedings of the 10th Annual Cyber and Information Security Research
               Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  pages     = {2:1--2:7},
  year      = {2015},
  crossref  = {DBLP:conf/csiirw/2015},
  url       = {http://doi.acm.org/10.1145/2746266.2746268},
  doi       = {10.1145/2746266.2746268},
  timestamp = {Tue, 30 Jun 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csiirw/GrandgenettMG15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/MandalGS15,
  author    = {Sayonnha Mandal and
               Robin A. Gandhi and
               Harvey P. Siy},
  title     = {Semantic web representations for reasoning about applicability and
               satisfiability of federal regulations for information security},
  booktitle = {Eighth {IEEE} International Workshop on Requirements Engineering and
               Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015},
  pages     = {1--9},
  year      = {2015},
  crossref  = {DBLP:conf/re/2015relaw},
  url       = {http://doi.ieeecomputersociety.org/10.1109/RELAW.2015.7330205},
  doi       = {10.1109/RELAW.2015.7330205},
  timestamp = {Mon, 09 May 2016 13:04:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/MandalGS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/GandhiCSM14,
  author    = {Robin A. Gandhi and
               Keesha Crosby and
               Harvey P. Siy and
               Sayonnha Mandal},
  title     = {Gauging the Impact of {FISMA} on Software Security},
  journal   = {{IEEE} Computer},
  volume    = {47},
  number    = {9},
  pages     = {103--107},
  year      = {2014},
  url       = {https://doi.org/10.1109/MC.2014.248},
  doi       = {10.1109/MC.2014.248},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/computer/GandhiCSM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SharmaGZMS13,
  author    = {Anup C. Sharma and
               Robin A. Gandhi and
               Qiuming Zhu and
               William R. Mahoney and
               William L. Sousan},
  title     = {A social dimensional cyber threat model with formal concept analysis
               and fact-proposition inference},
  journal   = {{IJICS}},
  volume    = {5},
  number    = {4},
  pages     = {301--333},
  year      = {2013},
  url       = {https://doi.org/10.1504/IJICS.2013.058213},
  doi       = {10.1504/IJICS.2013.058213},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijics/SharmaGZMS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/WuGS13,
  author    = {Yan Wu and
               Robin A. Gandhi and
               Harvey P. Siy},
  title     = {Semi-Automatic Annotation of Natural Language Vulnerability Reports},
  journal   = {{IJSSE}},
  volume    = {4},
  number    = {3},
  pages     = {18--41},
  year      = {2013},
  url       = {https://doi.org/10.4018/jsse.2013070102},
  doi       = {10.4018/jsse.2013070102},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijsse/WuGS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GandhiSW13,
  author    = {Robin A. Gandhi and
               Harvey P. Siy and
               Yan Wu},
  title     = {Lightweight formal models of software weaknesses},
  booktitle = {1st {FME} Workshop on Formal Methods in Software Engineering, FormaliSE
               2013, San Francisco, CA, USA, May 25, 2013},
  pages     = {50--56},
  year      = {2013},
  crossref  = {DBLP:conf/icse/2013formalise},
  url       = {https://doi.org/10.1109/FormaliSE.2013.6612277},
  doi       = {10.1109/FormaliSE.2013.6612277},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/GandhiSW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inroads/MahoneyG12,
  author    = {William R. Mahoney and
               Robin A. Gandhi},
  title     = {Reverse engineering: \emph{is it art?}},
  journal   = {Inroads},
  volume    = {3},
  number    = {1},
  pages     = {56--61},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2077808.2077826},
  doi       = {10.1145/2077808.2077826},
  timestamp = {Fri, 22 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/inroads/MahoneyG12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inroads/GandhiJM12,
  author    = {Robin A. Gandhi and
               Connie Jones and
               William R. Mahoney},
  title     = {A freshman level course on information assurance: can it be done?
               \emph{here's how}},
  journal   = {Inroads},
  volume    = {3},
  number    = {3},
  pages     = {50--61},
  year      = {2012},
  url       = {http://doi.acm.org/10.1145/2339055.2339072},
  doi       = {10.1145/2339055.2339072},
  timestamp = {Fri, 22 May 2015 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/inroads/GandhiJM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GandhiR12,
  author    = {Robin A. Gandhi and
               Mariam Rahmani},
  title     = {Early security patterns: {A} collection of constraints to describe
               regulatory security requirements},
  booktitle = {Second {IEEE} International Workshop on Requirements Patterns, RePa
               2012, Chicago, IL, USA, September 24, 2012},
  pages     = {17--22},
  year      = {2012},
  crossref  = {DBLP:conf/re/2012repa},
  url       = {https://doi.org/10.1109/RePa.2012.6359966},
  doi       = {10.1109/RePa.2012.6359966},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/GandhiR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/MahoneyG11,
  author    = {William R. Mahoney and
               Robin A. Gandhi},
  title     = {An integrated framework for control system simulation and regulatory
               compliance monitoring},
  journal   = {{IJCIP}},
  volume    = {4},
  number    = {1},
  pages     = {41--53},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.ijcip.2011.03.002},
  doi       = {10.1016/j.ijcip.2011.03.002},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijcip/MahoneyG11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tasm/GandhiSMSZL11,
  author    = {Robin A. Gandhi and
               Anup C. Sharma and
               William R. Mahoney and
               William L. Sousan and
               Qiuming Zhu and
               Phillip A. Laplante},
  title     = {Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political},
  journal   = {{IEEE} Technol. Soc. Mag.},
  volume    = {30},
  number    = {1},
  pages     = {28--38},
  year      = {2011},
  url       = {https://doi.org/10.1109/MTS.2011.940293},
  doi       = {10.1109/MTS.2011.940293},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tasm/GandhiSMSZL11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/GandhiL11,
  author    = {Robin A. Gandhi and
               Seok Won Lee},
  title     = {Discovering Multidimensional Correlations among Regulatory Requirements
               to Understand Risk},
  journal   = {{ACM} Trans. Softw. Eng. Methodol.},
  volume    = {20},
  number    = {4},
  pages     = {16:1--16:37},
  year      = {2011},
  url       = {http://doi.acm.org/10.1145/2000799.2000802},
  doi       = {10.1145/2000799.2000802},
  timestamp = {Tue, 03 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosem/GandhiL11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/SousanGZM11,
  author    = {William L. Sousan and
               Robin A. Gandhi and
               Qiuming Zhu and
               William R. Mahoney},
  title     = {Using anomalous event patterns in control systems for tamper detection},
  booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence
               Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
               2011},
  pages     = {26},
  year      = {2011},
  crossref  = {DBLP:conf/csiirw/2011},
  url       = {http://doi.acm.org/10.1145/2179298.2179326},
  doi       = {10.1145/2179298.2179326},
  timestamp = {Thu, 10 Jan 2013 09:44:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csiirw/SousanGZM11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WuSG11,
  author    = {Yan Wu and
               Harvey P. Siy and
               Robin A. Gandhi},
  title     = {Empirical results on the study of software vulnerabilities},
  booktitle = {Proceedings of the 33rd International Conference on Software Engineering,
               {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011},
  pages     = {964--967},
  year      = {2011},
  crossref  = {DBLP:conf/icse/2011},
  url       = {http://doi.acm.org/10.1145/1985793.1985960},
  doi       = {10.1145/1985793.1985960},
  timestamp = {Wed, 01 Apr 2015 20:06:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/WuSG11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/WuGS10,
  author    = {Yan Wu and
               Robin A. Gandhi and
               Harvey P. Siy},
  title     = {Using semantic templates to study vulnerabilities recorded in large
               software repositories},
  booktitle = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
               2010, May 2, 2010, Cape Town, South Africa},
  pages     = {22--28},
  year      = {2010},
  crossref  = {DBLP:conf/icse/2010sess},
  url       = {http://doi.acm.org/10.1145/1809100.1809104},
  doi       = {10.1145/1809100.1809104},
  timestamp = {Tue, 01 Jul 2014 16:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/WuGS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/WalenzGMZ10,
  author    = {Brett Walenz and
               Robin A. Gandhi and
               William R. Mahoney and
               Qiuming Zhu},
  title     = {Exploring Social Contexts along the Time Dimension: Temporal Analysis
               of Named Entities},
  booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  pages     = {508--512},
  year      = {2010},
  crossref  = {DBLP:conf/socialcom/2010},
  url       = {https://doi.org/10.1109/SocialCom.2010.80},
  doi       = {10.1109/SocialCom.2010.80},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/WalenzGMZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/SousanZGMS10,
  author    = {William L. Sousan and
               Qiuming Zhu and
               Robin A. Gandhi and
               William R. Mahoney and
               Anup C. Sharma},
  title     = {Using Term Extraction Patterns to Discover Coherent Relationships
               from Open Source Intelligence},
  booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  pages     = {967--972},
  year      = {2010},
  crossref  = {DBLP:conf/socialcom/2010},
  url       = {https://doi.org/10.1109/SocialCom.2010.143},
  doi       = {10.1109/SocialCom.2010.143},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/SousanZGMS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/SharmaGMSZ10,
  author    = {Anup C. Sharma and
               Robin A. Gandhi and
               William R. Mahoney and
               William L. Sousan and
               Qiuming Zhu},
  title     = {Building a Social Dimensional Threat Model from Current and Historic
               Events of Cyber Attacks},
  booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  pages     = {981--986},
  year      = {2010},
  crossref  = {DBLP:conf/socialcom/2010},
  url       = {https://doi.org/10.1109/SocialCom.2010.145},
  doi       = {10.1109/SocialCom.2010.145},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/SharmaGMSZ10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/se/LeeGP10,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Sooyong Park},
  title     = {Requirements: Tracing},
  booktitle = {Encyclopedia of Software Engineering},
  pages     = {999--1011},
  year      = {2010},
  crossref  = {DBLP:reference/se/2010},
  url       = {http://www.crcnetbase.com/doi/abs/10.1081/E-ESE-120044209},
  timestamp = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/reference/se/LeeGP10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/LeeGW09,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Siddharth J. Wagle},
  title     = {Ontology-Guided Service-Oriented Architecture Composition to Support
               Complex and Tailorable Process Definitions},
  journal   = {International Journal of Software Engineering and Knowledge Engineering},
  volume    = {19},
  number    = {6},
  pages     = {791--821},
  year      = {2009},
  url       = {https://doi.org/10.1142/S0218194009004386},
  doi       = {10.1142/S0218194009004386},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijseke/LeeGW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/refsq/GandhiL09,
  author    = {Robin A. Gandhi and
               Seok Won Lee},
  title     = {Assurance Case Driven Case Study Design for Requirements Engineering
               Research},
  booktitle = {Requirements Engineering: Foundation for Software Quality, 15th International
               Working Conference, {REFSQ} 2009, Amsterdam, The Netherlands, June
               8-9, 2009, Proceedings},
  pages     = {190--196},
  year      = {2009},
  crossref  = {DBLP:conf/refsq/2009},
  url       = {https://doi.org/10.1007/978-3-642-02050-6\_16},
  doi       = {10.1007/978-3-642-02050-6\_16},
  timestamp = {Wed, 17 May 2017 14:24:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/refsq/GandhiL09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/sci/GandhiL09,
  author    = {Robin A. Gandhi and
               Seok Won Lee},
  title     = {Ontology Guided Risk Analysis: From Informal Specifications to Formal
               Metrics},
  booktitle = {Advances in Information and Intelligent Systems},
  pages     = {227--249},
  year      = {2009},
  crossref  = {DBLP:series/sci/2009-251},
  url       = {https://doi.org/10.1007/978-3-642-04141-9\_11},
  doi       = {10.1007/978-3-642-04141-9\_11},
  timestamp = {Tue, 16 May 2017 14:24:36 +0200},
  biburl    = {https://dblp.org/rec/bib/series/sci/GandhiL09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sopr/LeeGA07,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Gail{-}Joon Ahn},
  title     = {Certification process artifacts defined as measurable units for software
               assurance},
  journal   = {Software Process: Improvement and Practice},
  volume    = {12},
  number    = {2},
  pages     = {165--189},
  year      = {2007},
  url       = {https://doi.org/10.1002/spip.313},
  doi       = {10.1002/spip.313},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sopr/LeeGA07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGW07,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Siddharth J. Wagle},
  title     = {Towards a Requirements-Driven Workbench for Supporting Software Certification
               and Accreditation},
  booktitle = {Third International Workshop on Software Engineering for Secure Systems,
               {SESS} 2007, Minneapolis, MN, USA, May 20-26, 2007},
  pages     = {8},
  year      = {2007},
  crossref  = {DBLP:conf/icse/2007sess},
  url       = {https://doi.org/10.1109/SESS.2007.11},
  doi       = {10.1109/SESS.2007.11},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/LeeGW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/GandhiL07,
  author    = {Robin A. Gandhi and
               Seok Won Lee},
  title     = {Discovering and Understanding Multi-dimensional Correlations among
               Certification Requirements with application to Risk Assessment},
  booktitle = {15th {IEEE} International Requirements Engineering Conference, {RE}
               2007, October 15-19th, 2007, New Delhi, India},
  pages     = {231--240},
  year      = {2007},
  crossref  = {DBLP:conf/re/2007},
  url       = {https://doi.org/10.1109/RE.2007.46},
  doi       = {10.1109/RE.2007.46},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/GandhiL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/LeeGWM07,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Siddharth J. Wagle and
               Ajeet B. Murty},
  title     = {r-AnalytiCA: Requirements Analytics for Certification {\&} Accreditation},
  booktitle = {15th {IEEE} International Requirements Engineering Conference, {RE}
               2007, October 15-19th, 2007, New Delhi, India},
  pages     = {383--384},
  year      = {2007},
  crossref  = {DBLP:conf/re/2007},
  url       = {https://doi.org/10.1109/RE.2007.34},
  doi       = {10.1109/RE.2007.34},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/LeeGWM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/LeeMGYA06,
  author    = {Seok Won Lee and
               Divya Muthurajan and
               Robin A. Gandhi and
               Deepak S. Yavagal and
               Gail{-}Joon Ahn},
  title     = {Building Decision Support Problem Domain Ontology from Natural Language
               Requirements for Software Assurance},
  journal   = {International Journal of Software Engineering and Knowledge Engineering},
  volume    = {16},
  number    = {6},
  pages     = {851--884},
  year      = {2006},
  url       = {https://doi.org/10.1142/S0218194006003051},
  doi       = {10.1142/S0218194006003051},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijseke/LeeMGYA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGMYA06,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Divya Muthurajan and
               Deepak S. Yavagal and
               Gail{-}Joon Ahn},
  title     = {Building problem domain ontology from security requirements in regulatory
               documents},
  booktitle = {Proceedings of the 2006 international workshop on Software engineering
               for secure systems, {SESS} 2006, Shanghai, China, May 20-21, 2006},
  pages     = {43--50},
  year      = {2006},
  crossref  = {DBLP:conf/icse/2006sess},
  url       = {http://doi.acm.org/10.1145/1137627.1137635},
  doi       = {10.1145/1137627.1137635},
  timestamp = {Thu, 13 Aug 2015 15:06:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/LeeGMYA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/re/RichterGLL06,
  author    = {Heather Richter and
               Robin A. Gandhi and
               Lei Liu and
               Seok Won Lee},
  title     = {Incorporating Multimedia Source Materials into a Traceability Framework},
  booktitle = {2006 First International Workshop on Multimedia Requirements Engineering,
               {MERE} 2006, Minnneapolis, MN, USA, September 12, 2006},
  pages     = {7},
  year      = {2006},
  crossref  = {DBLP:conf/re/2006mere},
  url       = {https://doi.org/10.1109/MERE.2006.3},
  doi       = {10.1109/MERE.2006.3},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/RichterGLL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigsoft/LeeGA05,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Gail{-}Joon Ahn},
  title     = {Establishing trustworthiness in services of the critical infrastructure
               through certification and accreditation},
  journal   = {{ACM} {SIGSOFT} Software Engineering Notes},
  volume    = {30},
  number    = {4},
  pages     = {1--7},
  year      = {2005},
  url       = {http://doi.acm.org/10.1145/1082983.1083205},
  doi       = {10.1145/1082983.1083205},
  timestamp = {Thu, 08 May 2008 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sigsoft/LeeGA05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ACMse/YavagalLAG05,
  author    = {Deepak S. Yavagal and
               Seok Won Lee and
               Gail{-}Joon Ahn and
               Robin A. Gandhi},
  title     = {Common criteria requirements modeling and its uses for quality of
               information assurance (QoIA)},
  booktitle = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005,
               Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2},
  pages     = {130--135},
  year      = {2005},
  crossref  = {DBLP:conf/ACMse/2005-2},
  url       = {http://doi.acm.org/10.1145/1167253.1167287},
  doi       = {10.1145/1167253.1167287},
  timestamp = {Mon, 15 Jun 2015 19:00:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ACMse/YavagalLAG05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/LeeG05,
  author    = {Seok Won Lee and
               Robin A. Gandhi},
  title     = {Ontology-based Active Requirements Engineering Framework},
  booktitle = {12th Asia-Pacific Software Engineering Conference {(APSEC} 2005),
               15-17 December 2005, Taipei, Taiwan},
  pages     = {481--490},
  year      = {2005},
  crossref  = {DBLP:conf/apsec/2005},
  url       = {https://doi.org/10.1109/APSEC.2005.86},
  doi       = {10.1109/APSEC.2005.86},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/apsec/LeeG05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/LeeGA05,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Gail{-}Joon Ahn},
  title     = {Establishing trustworthiness in services of the critical infrastructure
               through certification and accreditation},
  booktitle = {Proceedings of the 2005 Workshop on Software Engineering for Secure
               Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis,
               Missouri, USA, May 15-16, 2005},
  pages     = {1--7},
  year      = {2005},
  crossref  = {DBLP:conf/icse/2005sess},
  url       = {http://doi.acm.org/10.1145/1083200.1083205},
  doi       = {10.1145/1083200.1083205},
  timestamp = {Thu, 13 Aug 2015 15:01:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/LeeGA05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/LeeGAY05,
  author    = {Seok Won Lee and
               Robin A. Gandhi and
               Gail{-}Joon Ahn and
               Deepak S. Yavagal},
  title     = {Active Automation of the {DITSCAP}},
  booktitle = {Intelligence and Security Informatics, {IEEE} International Conference
               on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
               USA, May 19-20, 2005, Proceedings},
  pages     = {479--485},
  year      = {2005},
  crossref  = {DBLP:conf/isi/2005},
  url       = {https://doi.org/10.1007/11427995\_46},
  doi       = {10.1007/11427995\_46},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isi/LeeGAY05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/ToloneGA03,
  author    = {William J. Tolone and
               Robin A. Gandhi and
               Gail{-}Joon Ahn},
  title     = {Locale-based access control: placing collaborative authorization decisions
               in context},
  booktitle = {Proceedings of the {IEEE} International Conference on Systems, Man
               {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  pages     = {4120--4127},
  year      = {2003},
  crossref  = {DBLP:conf/smc/2003},
  url       = {https://doi.org/10.1109/ICSMC.2003.1245632},
  doi       = {10.1109/ICSMC.2003.1245632},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/smc/ToloneGA03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2017,
  title     = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
               15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf
               on Big Data Intelligence and Computing and Cyber Science and Technology
               Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA,
               November 6-10, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8327304},
  isbn      = {978-1-5386-1956-8},
  timestamp = {Fri, 20 Apr 2018 16:03:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dasc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2015,
  editor    = {Joseph P. Trien and
               Stacy J. Prowell and
               Robert A. Bridges and
               John R. Goodall},
  title     = {Proceedings of the 10th Annual Cyber and Information Security Research
               Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2746266},
  isbn      = {978-1-4503-3345-0},
  timestamp = {Wed, 17 Jun 2015 09:34:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csiirw/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2015relaw,
  title     = {Eighth {IEEE} International Workshop on Requirements Engineering and
               Law, {RELAW} 2015, Ottawa, ON, Canada, August 25, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7324163},
  isbn      = {978-1-5090-0104-0},
  timestamp = {Mon, 09 May 2016 13:04:36 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/2015relaw},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2013formalise,
  title     = {1st {FME} Workshop on Formal Methods in Software Engineering, FormaliSE
               2013, San Francisco, CA, USA, May 25, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6596468},
  isbn      = {978-1-4673-6292-4},
  timestamp = {Fri, 07 Aug 2015 14:51:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2013formalise},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2012repa,
  title     = {Second {IEEE} International Workshop on Requirements Patterns, RePa
               2012, Chicago, IL, USA, September 24, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6338383},
  isbn      = {978-1-4673-4374-9},
  timestamp = {Wed, 05 Dec 2012 15:48:44 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/re/2012repa},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csiirw/2011,
  editor    = {Frederick T. Sheldon and
               Robert K. Abercrombie and
               Axel W. Krings},
  title     = {Proceedings of the 7th Cyber Security and Information Intelligence
               Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
               2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2179298},
  isbn      = {978-1-4503-0945-5},
  timestamp = {Thu, 10 Jan 2013 09:44:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csiirw/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2011,
  editor    = {Richard N. Taylor and
               Harald C. Gall and
               Nenad Medvidovic},
  title     = {Proceedings of the 33rd International Conference on Software Engineering,
               {ICSE} 2011, Waikiki, Honolulu , HI, USA, May 21-28, 2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-0445-0},
  timestamp = {Wed, 01 Apr 2015 20:06:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2010sess,
  editor    = {Seok{-}Won Lee and
               Mattia Monga and
               Jan J{\"{u}}rjens},
  title     = {{ICSE} Workshop on Software Engineering for Secure Systems, {SESS}
               2010, May 2, 2010, Cape Town, South Africa},
  publisher = {{ACM}},
  year      = {2010},
  url       = {http://dl.acm.org/citation.cfm?id=1809100},
  isbn      = {978-1-60558-965-7},
  timestamp = {Tue, 01 Jul 2014 16:01:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2010sess},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/socialcom/2010,
  editor    = {Ahmed K. Elmagarmid and
               Divyakant Agrawal},
  title     = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5590331},
  isbn      = {978-0-7695-4211-9},
  timestamp = {Fri, 28 Aug 2015 14:17:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/socialcom/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:reference/se/2010,
  editor    = {Phillip A. Laplante},
  title     = {Encyclopedia of Software Engineering},
  publisher = {Taylor {\&} Francis},
  year      = {2010},
  isbn      = {978-1-4200-5977-9},
  timestamp = {Fri, 25 Nov 2011 17:51:57 +0100},
  biburl    = {https://dblp.org/rec/bib/reference/se/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/refsq/2009,
  editor    = {Martin Glinz and
               Patrick Heymans},
  title     = {Requirements Engineering: Foundation for Software Quality, 15th International
               Working Conference, {REFSQ} 2009, Amsterdam, The Netherlands, June
               8-9, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5512},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02050-6},
  doi       = {10.1007/978-3-642-02050-6},
  isbn      = {978-3-642-02049-0},
  timestamp = {Wed, 17 May 2017 14:24:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/refsq/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sci/2009-251,
  editor    = {Zbigniew W. Ras and
               William Ribarsky},
  title     = {Advances in Information and Intelligent Systems},
  series    = {Studies in Computational Intelligence},
  volume    = {251},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04141-9},
  doi       = {10.1007/978-3-642-04141-9},
  isbn      = {978-3-642-04140-2},
  timestamp = {Tue, 16 May 2017 14:24:36 +0200},
  biburl    = {https://dblp.org/rec/bib/series/sci/2009-251},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2007sess,
  title     = {Third International Workshop on Software Engineering for Secure Systems,
               {SESS} 2007, Minneapolis, MN, USA, May 20-26, 2007},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4273323},
  isbn      = {0-7695-2952-6},
  timestamp = {Tue, 11 Aug 2015 10:20:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2007sess},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2007,
  title     = {15th {IEEE} International Requirements Engineering Conference, {RE}
               2007, October 15-19th, 2007, New Delhi, India},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4384149},
  isbn      = {0-7695-2935-6},
  timestamp = {Tue, 30 Sep 2014 17:11:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2006sess,
  editor    = {Danilo Bruschi and
               Bart De Win and
               Mattia Monga},
  title     = {Proceedings of the 2006 international workshop on Software engineering
               for secure systems, {SESS} 2006, Shanghai, China, May 20-21, 2006},
  publisher = {{ACM}},
  year      = {2006},
  url       = {http://dl.acm.org/citation.cfm?id=1137627},
  isbn      = {1-59593-411-1},
  timestamp = {Thu, 13 Aug 2015 15:06:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2006sess},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/re/2006mere,
  editor    = {Oliver Creighton and
               Bernd Bruegge},
  title     = {2006 First International Workshop on Multimedia Requirements Engineering,
               {MERE} 2006, Minnneapolis, MN, USA, September 12, 2006},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4022116},
  isbn      = {0-7695-2713-2},
  timestamp = {Mon, 09 May 2016 14:16:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/re/2006mere},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ACMse/2005-2,
  editor    = {M{\'{a}}rio Guimar{\~{a}}es},
  title     = {Proceedings of the 43nd Annual Southeast Regional Conference, 2005,
               Kennesaw, Georgia, Alabama, USA, March 18-20, 2005, Volume 2},
  publisher = {{ACM}},
  year      = {2005},
  timestamp = {Mon, 15 Jun 2015 19:00:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ACMse/2005-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apsec/2005,
  title     = {12th Asia-Pacific Software Engineering Conference {(APSEC} 2005),
               15-17 December 2005, Taipei, Taiwan},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10689},
  isbn      = {0-7695-2465-6},
  timestamp = {Tue, 25 Nov 2014 17:05:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/apsec/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2005sess,
  title     = {Proceedings of the 2005 Workshop on Software Engineering for Secure
               Systems - Building Trustworthy Applications, {SESS} 2005, St. Louis,
               Missouri, USA, May 15-16, 2005},
  publisher = {{ACM}},
  year      = {2005},
  url       = {http://dl.acm.org/citation.cfm?id=1083200},
  isbn      = {1-59593-114-7},
  timestamp = {Thu, 13 Aug 2015 15:01:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2005sess},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isi/2005,
  editor    = {Paul B. Kantor and
               Gheorghe Muresan and
               Fred S. Roberts and
               Daniel Dajun Zeng and
               Fei{-}Yue Wang and
               Hsinchun Chen and
               Ralph C. Merkle},
  title     = {Intelligence and Security Informatics, {IEEE} International Conference
               on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
               USA, May 19-20, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3495},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b136511},
  doi       = {10.1007/b136511},
  isbn      = {3-540-25999-6},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isi/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/smc/2003,
  title     = {Proceedings of the {IEEE} International Conference on Systems, Man
               {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8811},
  isbn      = {0-7803-7952-7},
  timestamp = {Thu, 05 Dec 2013 17:22:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/smc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier