Search dblp for Publications

export results for "toc:db/journals/ijsse/ijsse1.bht:"

 download as .bib file

@article{DBLP:journals/ijsse/AdenijiL10,
  author       = {Aderemi O. Adeniji and
                  Seok{-}Won Lee},
  title        = {Assimilating and Optimizing Software Assurance in the {SDLC:} {A}
                  Framework and Step-Wise Approach},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {62--80},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010100104},
  doi          = {10.4018/JSSE.2010100104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/AdenijiL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Bai10,
  author       = {Yun Bai},
  title        = {A Formal Approach for Securing {XML} Document},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {41--53},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010102003},
  doi          = {10.4018/JSSE.2010102003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/Bai10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Barjis10,
  author       = {Joseph Barjis},
  title        = {Software Engineering Security Based on Business Process Modeling},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {1--17},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010040101},
  doi          = {10.4018/JSSE.2010040101},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/Barjis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/BratusORSL10,
  author       = {Sergey Bratus and
                  James Oakley and
                  Ashwin Ramaswamy and
                  Sean W. Smith and
                  Michael E. Locasto},
  title        = {Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader
                  Toolchain},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {1--17},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010070101},
  doi          = {10.4018/JSSE.2010070101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/BratusORSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DaiMK10,
  author       = {Huning Dai and
                  Christian Murphy and
                  Gail E. Kaiser},
  title        = {{CONFU:} Configuration Fuzzing Testing Framework for Software Vulnerability
                  Detection},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {41--55},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010070103},
  doi          = {10.4018/JSSE.2010070103},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/DaiMK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DoanDMB10,
  author       = {Thuong Doan and
                  Steven A. Demurjian and
                  Laurent Michel and
                  Solomon Berhe},
  title        = {Integrating Access Control into {UML} for Secure Software Modeling
                  and Analysis},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {1--19},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010102001},
  doi          = {10.4018/JSSE.2010102001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/DoanDMB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FailyF10,
  author       = {Shamal Faily and
                  Ivan Flechais},
  title        = {Towards Tool-Support for Usable Secure Requirements Engineering with
                  {CAIRIS}},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {56--70},
  year         = {2010},
  url          = {https://doi.org/10.4018/IJSSE.2010070104},
  doi          = {10.4018/IJSSE.2010070104},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/FailyF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/GirardMHD10,
  author       = {Fr{\'{e}}d{\'{e}}ric Girard and
                  Bertrand Meunier and
                  Duan Hua and
                  Eric Dubois},
  title        = {A Rigorous Approach to the Definition of an International Vocational
                  Master's Degree in Information Security Management},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {1--17},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010100101},
  doi          = {10.4018/JSSE.2010100101},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/GirardMHD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KhanH10,
  author       = {Khaled M. Khan and
                  Jun Han},
  title        = {A Tool Support for Secure Software Integration},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {35--56},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010040103},
  doi          = {10.4018/JSSE.2010040103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/KhanH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Mead10,
  author       = {Nancy R. Mead},
  title        = {Benefits and Challenges in the Use of Case Studies for Security Requirements
                  Engineering Methods},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {74--91},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010102005},
  doi          = {10.4018/JSSE.2010102005},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/Mead10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MeadAAHKLM10,
  author       = {Nancy R. Mead and
                  Julia H. Allen and
                  Mark A. Ardis and
                  Thomas B. Hilburn and
                  Andrew J. Kornecki and
                  Richard C. Linger and
                  James McDonald},
  title        = {Development of a Master of Software Assurance Reference Curriculum},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {18--34},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010100102},
  doi          = {10.4018/JSSE.2010100102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MeadAAHKLM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/NhlabatsiNY10,
  author       = {Armstrong Nhlabatsi and
                  Bashar Nuseibeh and
                  Yijun Yu},
  title        = {Security Requirements Engineering for Evolving Software Systems: {A}
                  Survey},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {54--73},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010102004},
  doi          = {10.4018/JSSE.2010102004},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/NhlabatsiNY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/NicolaysenSLJ10,
  author       = {Torstein Nicolaysen and
                  Richard Sasson and
                  Maria B. Line and
                  Martin Gilje Jaatun},
  title        = {Agile Software Development: The Straight and Narrow Path to Secure
                  Software?},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {71--85},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010070105},
  doi          = {10.4018/JSSE.2010070105},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsse/NicolaysenSLJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ShahriarZ10,
  author       = {Hossain Shahriar and
                  Mohammad Zulkernine},
  title        = {Monitoring Buffer Overflow Attacks: {A} Perennial Task},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {18--40},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010070102},
  doi          = {10.4018/JSSE.2010070102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/ShahriarZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SimpsonSEP10,
  author       = {Joseph J. Simpson and
                  Mary J. Simpson and
                  Barbara Endicott{-}Popovsky and
                  Viatcheslav Popovsky},
  title        = {Secure Software Education: {A} Contextual Model-Based Approach},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {4},
  pages        = {35--61},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010100103},
  doi          = {10.4018/JSSE.2010100103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/SimpsonSEP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SunB10,
  author       = {San{-}Tsai Sun and
                  Konstantin Beznosov},
  title        = {Retrofitting Existing Web Applications with Effective Dynamic Protection
                  Against {SQL} Injection Attacks},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {1},
  pages        = {20--40},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010102002},
  doi          = {10.4018/JSSE.2010102002},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/SunB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/Yee10,
  author       = {George O. M. Yee},
  title        = {Towards Designing E-Services that Protect Privacy},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {18--34},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010040102},
  doi          = {10.4018/JSSE.2010040102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/Yee10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/YounanJPE10,
  author       = {Yves Younan and
                  Wouter Joosen and
                  Frank Piessens and
                  Hans Van den Eynden},
  title        = {Improving Memory Management Security for {C} and {C++}},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {1},
  number       = {2},
  pages        = {57--82},
  year         = {2010},
  url          = {https://doi.org/10.4018/jsse.2010040104},
  doi          = {10.4018/JSSE.2010040104},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/YounanJPE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics