Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jose Romero-Mariona
@article{DBLP:journals/ijoci/HallmanMRPRSTM21, author = {Roger A. Hallman and Maxine Major and Jose Romero{-}Mariona and Richard Phipps and Esperanza Romero and Scott M. Slayback and Francisco Tacliad and John M. San Miguel}, title = {Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures}, journal = {Int. J. Organ. Collect. Intell.}, volume = {11}, number = {2}, pages = {91--112}, year = {2021}, url = {https://doi.org/10.4018/IJOCI.2021040105}, doi = {10.4018/IJOCI.2021040105}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijoci/HallmanMRPRSTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/CifranicHRSCC20, author = {Nicholas Cifranic and Roger A. Hallman and Jose Romero{-}Mariona and Brian Souza and Trevor Calton and Giancarlo Coca}, title = {Decepti-SCADA: {A} cyber deception framework for active defense of networked critical infrastructures}, journal = {Internet Things}, volume = {12}, pages = {100320}, year = {2020}, url = {https://doi.org/10.1016/j.iot.2020.100320}, doi = {10.1016/J.IOT.2020.100320}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/CifranicHRSCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/complexis/HallmanMRPRM20, author = {Roger A. Hallman and Maxine Major and Jose Romero{-}Mariona and Richard Phipps and Esperanza Romero and John M. San Miguel}, editor = {Reinhold Behringer and Victor Chang}, title = {Return on Cybersecurity Investment in Operational Technology Systems: Quantifying the Value That Cybersecurity Technologies Provide after Integration}, booktitle = {Proceedings of the 5th International Conference on Complexity, Future Information Systems and Risk, {COMPLEXIS} 2020, Prague, Czech Republic, May 8-9, 2020}, pages = {43--52}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009416200430052}, doi = {10.5220/0009416200430052}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/complexis/HallmanMRPRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/CifranicRSH20, author = {Nicholas Cifranic and Jose Romero{-}Mariona and Brian Souza and Roger A. Hallman}, editor = {Gary B. Wills and P{\'{e}}ter Kacsuk and Victor Chang}, title = {Decepti-SCADA: {A} Framework for Actively Defending Networked Critical Infrastructures}, booktitle = {Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, IoTBDS 2020, Prague, Czech Republic, May 7-9, 2020}, pages = {69--77}, publisher = {{SCITEPRESS}}, year = {2020}, url = {https://doi.org/10.5220/0009343300690077}, doi = {10.5220/0009343300690077}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iotbd/CifranicRSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/HallmanBPDR17, author = {Roger Hallman and Josiah Bryan and Geancarlo Palavicini and Joseph DiVita and Jose Romero{-}Mariona}, editor = {Muthu Ramachandran and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Verena Kantere and Gary B. Wills and Robert John Walters and Victor Chang}, title = {IoDDoS - The Internet of Distributed Denial of Sevice Attacks - {A} Case Study of the Mirai Malware and IoT-Based Botnets}, booktitle = {Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security, IoTBDS 2017, Porto, Portugal, April 24-26, 2017}, pages = {47--58}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006246600470058}, doi = {10.5220/0006246600470058}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/HallmanBPDR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iotbd/Romero-MarionaH16, author = {Jose Romero{-}Mariona and Roger Hallman and Megan Kline and John San Miguel and Maxine Major and Lawrence Kerr}, editor = {Muthu Ramachandran and Gary B. Wills and Robert John Walters and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz and Victor Chang}, title = {Security in the Industrial Internet of Things - The {C-SEC} Approach}, booktitle = {Proceedings of the International Conference on Internet of Things and Big Data, IoTBD 2016, Rome, Italy, April 23-25, 2016}, pages = {421--428}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005877904210428}, doi = {10.5220/0005877904210428}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/iotbd/Romero-MarionaH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/epsec/Romero-MarionaH15, author = {Jose Romero{-}Mariona and Roger Hallman and Megan Kline and Geancarlo Palavicini and Josiah Bryan and John San Miguel and Lawrence Kerr and Maxine Major and Jorge Alvarez}, editor = {Victor Chang and Muthu Ramachandran and Robert John Walters and Gary B. Wills}, title = {An Approach to Organizational Cybersecurity}, booktitle = {Enterprise Security - Second International Workshop, {ES} 2015, Vancouver, BC, Canada, November 30 - December 3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10131}, pages = {203--222}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-54380-2\_9}, doi = {10.1007/978-3-319-54380-2\_9}, timestamp = {Tue, 29 Sep 2020 09:39:42 +0200}, biburl = {https://dblp.org/rec/conf/epsec/Romero-MarionaH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/Romero-MarionaK15, author = {Jose Romero{-}Mariona and Megan Kline and John San Miguel}, title = {{C-SEC} (Cyber {SCADA} evaluation capability): Securing critical infrastructures}, booktitle = {2015 {IEEE} International Symposium on Software Reliability Engineering Workshops, {ISSRE} Workshops, Gaithersburg, MD, USA, November 2-5, 2015}, pages = {38}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ISSREW.2015.7392035}, doi = {10.1109/ISSREW.2015.7392035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/issre/Romero-MarionaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/Romero-Mariona14, author = {Jose Romero{-}Mariona}, title = {{DITEC} (DoD-Centric and Independent Technology Evaluation Capability): {A} Process for Testing Security}, booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April 4, 2014, Cleveland, Ohio, {USA}}, pages = {24--25}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICSTW.2014.52}, doi = {10.1109/ICSTW.2014.52}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/Romero-Mariona14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/Romero-MarionaS13, author = {Jose Romero{-}Mariona and Mihail Schoolov and Tom Nguyen and Tu{-}Anh Ton}, editor = {Joe Senftle and Mike Beltrani and Kari Karwedsky}, title = {{CEALICIAN:} Compact Encryption and Line-Integrated Circuitry for Information Assurance in Networking}, booktitle = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San Diego, CA, USA, November 18-20, 2013}, pages = {260--265}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/MILCOM.2013.52}, doi = {10.1109/MILCOM.2013.52}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/Romero-MarionaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/Romero-MarionaZR10, author = {Jose Romero{-}Mariona and Hadar Ziv and Debra J. Richardson}, title = {Formality of the Security Specification Process: Benefits Beyond Requirements}, booktitle = {43rd Hawaii International International Conference on Systems Science {(HICSS-43} 2010), Proceedings, 5-8 January 2010, Koloa, Kauai, HI, {USA}}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HICSS.2010.212}, doi = {10.1109/HICSS.2010.212}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/Romero-MarionaZR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/Romero-MarionaZR10, author = {Jose Romero{-}Mariona and Hadar Ziv and Debra J. Richardson}, editor = {Paolo Tonella and Alessandro Orso}, title = {{ASSURE:} automated support for secure and usable requirements engineering}, booktitle = {Proceedings of the Nineteenth International Symposium on Software Testing and Analysis, {ISSTA} 2010, Trento, Italy, July 12-16, 2010}, pages = {279--282}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1831708.1831744}, doi = {10.1145/1831708.1831744}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, biburl = {https://dblp.org/rec/conf/issta/Romero-MarionaZR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/Romero-MarionaZR10, author = {Jose Romero{-}Mariona and Hadar Ziv and Debra J. Richardson}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {Increasing Trustworthiness through Security Testing Support}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {920--925}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.136}, doi = {10.1109/SOCIALCOM.2010.136}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/Romero-MarionaZR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Romero-MarionaZRB09, author = {Jose Romero{-}Mariona and Hadar Ziv and Debra J. Richardson and Dennis Bystritsky}, editor = {Frederick T. Sheldon and Greg Peterson and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {Towards usable cyber security requirements}, booktitle = {Fifth Cyber Security and Information Intelligence Research Workshop, {CSIIRW} '09, Knoxville, TN, USA, April 13-15, 2009}, pages = {64}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1558607.1558681}, doi = {10.1145/1558607.1558681}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Romero-MarionaZRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/Romero-Mariona09, author = {Jose Romero{-}Mariona}, title = {Secure and Usable Requirements Engineering}, booktitle = {{ASE} 2009, 24th {IEEE/ACM} International Conference on Automated Software Engineering, Auckland, New Zealand, November 16-20, 2009}, pages = {703--706}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ASE.2009.81}, doi = {10.1109/ASE.2009.81}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/Romero-Mariona09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tapia/Romero-MarionaZR09, author = {Jose Romero{-}Mariona and Hadar Ziv and Debra J. Richardson}, editor = {Nina M. Berry}, title = {Later stages support for security requirements}, booktitle = {Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, Initiatives, Insight, and Innovations, Portland, Oregon, USA, April 1-4, 2009}, pages = {103--107}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1565799.1565823}, doi = {10.1145/1565799.1565823}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tapia/Romero-MarionaZR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/Romero-MarionaZ08, author = {Jose Romero{-}Mariona and Hadar Ziv and Debra J. Richardson}, title = {{SRRS:} a recommendation system for security requirements}, booktitle = {Proceedings of the 2008 International Workshop on Recommendation Systems for Software Engineering, {RSSE} 2008, Atlanta, GA, USA, November 9, 2008}, pages = {50--52}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1454247.1454266}, doi = {10.1145/1454247.1454266}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/Romero-MarionaZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Romero-MarionaZR07, author = {Jose Romero{-}Mariona and Hadar Ziv and Debra J. Richardson}, editor = {Ning Zhang and Ajith Abraham}, title = {{CCARCH:} Architecting Common Criteria Security Requirements}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {349--356}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.30}, doi = {10.1109/IAS.2007.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/Romero-MarionaZR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.