BibTeX records: Jose Romero-Mariona

download as .bib file

@article{DBLP:journals/ijoci/HallmanMRPRSTM21,
  author       = {Roger A. Hallman and
                  Maxine Major and
                  Jose Romero{-}Mariona and
                  Richard Phipps and
                  Esperanza Romero and
                  Scott M. Slayback and
                  Francisco Tacliad and
                  John M. San Miguel},
  title        = {Determining a Return on Investment for Cybersecurity Technologies
                  in Networked Critical Infrastructures},
  journal      = {Int. J. Organ. Collect. Intell.},
  volume       = {11},
  number       = {2},
  pages        = {91--112},
  year         = {2021},
  url          = {https://doi.org/10.4018/IJOCI.2021040105},
  doi          = {10.4018/IJOCI.2021040105},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijoci/HallmanMRPRSTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/CifranicHRSCC20,
  author       = {Nicholas Cifranic and
                  Roger A. Hallman and
                  Jose Romero{-}Mariona and
                  Brian Souza and
                  Trevor Calton and
                  Giancarlo Coca},
  title        = {Decepti-SCADA: {A} cyber deception framework for active defense of
                  networked critical infrastructures},
  journal      = {Internet Things},
  volume       = {12},
  pages        = {100320},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.iot.2020.100320},
  doi          = {10.1016/J.IOT.2020.100320},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/CifranicHRSCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/complexis/HallmanMRPRM20,
  author       = {Roger A. Hallman and
                  Maxine Major and
                  Jose Romero{-}Mariona and
                  Richard Phipps and
                  Esperanza Romero and
                  John M. San Miguel},
  editor       = {Reinhold Behringer and
                  Victor Chang},
  title        = {Return on Cybersecurity Investment in Operational Technology Systems:
                  Quantifying the Value That Cybersecurity Technologies Provide after
                  Integration},
  booktitle    = {Proceedings of the 5th International Conference on Complexity, Future
                  Information Systems and Risk, {COMPLEXIS} 2020, Prague, Czech Republic,
                  May 8-9, 2020},
  pages        = {43--52},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009416200430052},
  doi          = {10.5220/0009416200430052},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/complexis/HallmanMRPRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/CifranicRSH20,
  author       = {Nicholas Cifranic and
                  Jose Romero{-}Mariona and
                  Brian Souza and
                  Roger A. Hallman},
  editor       = {Gary B. Wills and
                  P{\'{e}}ter Kacsuk and
                  Victor Chang},
  title        = {Decepti-SCADA: {A} Framework for Actively Defending Networked Critical
                  Infrastructures},
  booktitle    = {Proceedings of the 5th International Conference on Internet of Things,
                  Big Data and Security, IoTBDS 2020, Prague, Czech Republic, May 7-9,
                  2020},
  pages        = {69--77},
  publisher    = {{SCITEPRESS}},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009343300690077},
  doi          = {10.5220/0009343300690077},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iotbd/CifranicRSH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/HallmanBPDR17,
  author       = {Roger Hallman and
                  Josiah Bryan and
                  Geancarlo Palavicini and
                  Joseph DiVita and
                  Jose Romero{-}Mariona},
  editor       = {Muthu Ramachandran and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Verena Kantere and
                  Gary B. Wills and
                  Robert John Walters and
                  Victor Chang},
  title        = {IoDDoS - The Internet of Distributed Denial of Sevice Attacks - {A}
                  Case Study of the Mirai Malware and IoT-Based Botnets},
  booktitle    = {Proceedings of the 2nd International Conference on Internet of Things,
                  Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26,
                  2017},
  pages        = {47--58},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006246600470058},
  doi          = {10.5220/0006246600470058},
  timestamp    = {Tue, 29 Sep 2020 09:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/HallmanBPDR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iotbd/Romero-MarionaH16,
  author       = {Jose Romero{-}Mariona and
                  Roger Hallman and
                  Megan Kline and
                  John San Miguel and
                  Maxine Major and
                  Lawrence Kerr},
  editor       = {Muthu Ramachandran and
                  Gary B. Wills and
                  Robert John Walters and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and
                  Victor Chang},
  title        = {Security in the Industrial Internet of Things - The {C-SEC} Approach},
  booktitle    = {Proceedings of the International Conference on Internet of Things
                  and Big Data, IoTBD 2016, Rome, Italy, April 23-25, 2016},
  pages        = {421--428},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005877904210428},
  doi          = {10.5220/0005877904210428},
  timestamp    = {Tue, 29 Sep 2020 09:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iotbd/Romero-MarionaH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/epsec/Romero-MarionaH15,
  author       = {Jose Romero{-}Mariona and
                  Roger Hallman and
                  Megan Kline and
                  Geancarlo Palavicini and
                  Josiah Bryan and
                  John San Miguel and
                  Lawrence Kerr and
                  Maxine Major and
                  Jorge Alvarez},
  editor       = {Victor Chang and
                  Muthu Ramachandran and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {An Approach to Organizational Cybersecurity},
  booktitle    = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver,
                  BC, Canada, November 30 - December 3, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10131},
  pages        = {203--222},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-54380-2\_9},
  doi          = {10.1007/978-3-319-54380-2\_9},
  timestamp    = {Tue, 29 Sep 2020 09:39:42 +0200},
  biburl       = {https://dblp.org/rec/conf/epsec/Romero-MarionaH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/Romero-MarionaK15,
  author       = {Jose Romero{-}Mariona and
                  Megan Kline and
                  John San Miguel},
  title        = {{C-SEC} (Cyber {SCADA} evaluation capability): Securing critical infrastructures},
  booktitle    = {2015 {IEEE} International Symposium on Software Reliability Engineering
                  Workshops, {ISSRE} Workshops, Gaithersburg, MD, USA, November 2-5,
                  2015},
  pages        = {38},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISSREW.2015.7392035},
  doi          = {10.1109/ISSREW.2015.7392035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/issre/Romero-MarionaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/Romero-Mariona14,
  author       = {Jose Romero{-}Mariona},
  title        = {{DITEC} (DoD-Centric and Independent Technology Evaluation Capability):
                  {A} Process for Testing Security},
  booktitle    = {Seventh {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April
                  4, 2014, Cleveland, Ohio, {USA}},
  pages        = {24--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICSTW.2014.52},
  doi          = {10.1109/ICSTW.2014.52},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/Romero-Mariona14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/Romero-MarionaS13,
  author       = {Jose Romero{-}Mariona and
                  Mihail Schoolov and
                  Tom Nguyen and
                  Tu{-}Anh Ton},
  editor       = {Joe Senftle and
                  Mike Beltrani and
                  Kari Karwedsky},
  title        = {{CEALICIAN:} Compact Encryption and Line-Integrated Circuitry for
                  Information Assurance in Networking},
  booktitle    = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
                  Diego, CA, USA, November 18-20, 2013},
  pages        = {260--265},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/MILCOM.2013.52},
  doi          = {10.1109/MILCOM.2013.52},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/Romero-MarionaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/Romero-MarionaZR10,
  author       = {Jose Romero{-}Mariona and
                  Hadar Ziv and
                  Debra J. Richardson},
  title        = {Formality of the Security Specification Process: Benefits Beyond Requirements},
  booktitle    = {43rd Hawaii International International Conference on Systems Science
                  {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI,
                  {USA}},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HICSS.2010.212},
  doi          = {10.1109/HICSS.2010.212},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/Romero-MarionaZR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/Romero-MarionaZR10,
  author       = {Jose Romero{-}Mariona and
                  Hadar Ziv and
                  Debra J. Richardson},
  editor       = {Paolo Tonella and
                  Alessandro Orso},
  title        = {{ASSURE:} automated support for secure and usable requirements engineering},
  booktitle    = {Proceedings of the Nineteenth International Symposium on Software
                  Testing and Analysis, {ISSTA} 2010, Trento, Italy, July 12-16, 2010},
  pages        = {279--282},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1831708.1831744},
  doi          = {10.1145/1831708.1831744},
  timestamp    = {Tue, 06 Nov 2018 16:57:30 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/Romero-MarionaZR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/Romero-MarionaZR10,
  author       = {Jose Romero{-}Mariona and
                  Hadar Ziv and
                  Debra J. Richardson},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Increasing Trustworthiness through Security Testing Support},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {920--925},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.136},
  doi          = {10.1109/SOCIALCOM.2010.136},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/Romero-MarionaZR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Romero-MarionaZRB09,
  author       = {Jose Romero{-}Mariona and
                  Hadar Ziv and
                  Debra J. Richardson and
                  Dennis Bystritsky},
  editor       = {Frederick T. Sheldon and
                  Greg Peterson and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {Towards usable cyber security requirements},
  booktitle    = {Fifth Cyber Security and Information Intelligence Research Workshop,
                  {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009},
  pages        = {64},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1558607.1558681},
  doi          = {10.1145/1558607.1558681},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Romero-MarionaZRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/Romero-Mariona09,
  author       = {Jose Romero{-}Mariona},
  title        = {Secure and Usable Requirements Engineering},
  booktitle    = {{ASE} 2009, 24th {IEEE/ACM} International Conference on Automated
                  Software Engineering, Auckland, New Zealand, November 16-20, 2009},
  pages        = {703--706},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ASE.2009.81},
  doi          = {10.1109/ASE.2009.81},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/Romero-Mariona09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tapia/Romero-MarionaZR09,
  author       = {Jose Romero{-}Mariona and
                  Hadar Ziv and
                  Debra J. Richardson},
  editor       = {Nina M. Berry},
  title        = {Later stages support for security requirements},
  booktitle    = {Proceedings of the Richard Tapia Celebration of Diversity in Computing
                  Conference 2009: Intellect, Initiatives, Insight, and Innovations,
                  Portland, Oregon, USA, April 1-4, 2009},
  pages        = {103--107},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1565799.1565823},
  doi          = {10.1145/1565799.1565823},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tapia/Romero-MarionaZR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/Romero-MarionaZ08,
  author       = {Jose Romero{-}Mariona and
                  Hadar Ziv and
                  Debra J. Richardson},
  title        = {{SRRS:} a recommendation system for security requirements},
  booktitle    = {Proceedings of the 2008 International Workshop on Recommendation Systems
                  for Software Engineering, {RSSE} 2008, Atlanta, GA, USA, November
                  9, 2008},
  pages        = {50--52},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1454247.1454266},
  doi          = {10.1145/1454247.1454266},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/Romero-MarionaZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Romero-MarionaZR07,
  author       = {Jose Romero{-}Mariona and
                  Hadar Ziv and
                  Debra J. Richardson},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {{CCARCH:} Architecting Common Criteria Security Requirements},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {349--356},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.30},
  doi          = {10.1109/IAS.2007.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Romero-MarionaZR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics