Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijsse/ijsse5.bht:"
@article{DBLP:journals/ijsse/BeckersCGGH14, author = {Kristian Beckers and Isabelle C{\^{o}}t{\'{e}} and Ludger Goeke and Selim G{\"{u}}ler and Maritta Heisel}, title = {A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {2}, pages = {20--43}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014040102}, doi = {10.4018/IJSSE.2014040102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/BeckersCGGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/CianciaMMMPP14, author = {Vincenzo Ciancia and Jos{\'{e}} Antonio Mart{\'{\i}}n and Fabio Martinelli and Ilaria Matteucci and Marinella Petrocchi and Ernesto Pimentel}, title = {Automated Synthesis and Ranking of Secure {BPMN} Orchestrators}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {2}, pages = {44--64}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014040103}, doi = {10.4018/IJSSE.2014040103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/CianciaMMMPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/CobourneKMM14, author = {Sheila Cobourne and Lazaros Kyrillidis and Keith Mayes and Konstantinos Markantonakis}, title = {Remote E-Voting Using the Smart Card Web Server}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {39--60}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010103}, doi = {10.4018/IJSSE.2014010103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/CobourneKMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/EssafiG14, author = {Mehrez Essafi and Henda Ben Gh{\'{e}}zala}, title = {Meta-Modeling Based Secure Software Development Processes}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {3}, pages = {56--74}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014070104}, doi = {10.4018/IJSSE.2014070104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/EssafiG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FeldererKKJOPTT14, author = {Michael Felderer and Basel Katt and Philipp Kalb and Jan J{\"{u}}rjens and Mart{\'{\i}}n Ochoa and Federica Paci and Le Minh Sang Tran and Thein Than Tun and Koen Yskout and Riccardo Scandariato and Frank Piessens and Dries Vanoverberghe and Elizabeta Fourneret and Matthias Gander and Bj{\o}rnar Solhaug and Ruth Breu}, title = {Evolution of Security Engineering Artifacts: {A} State of the Art Survey}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {4}, pages = {48--98}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014100103}, doi = {10.4018/IJSSE.2014100103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FeldererKKJOPTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/FrickerRC14, author = {Christine Fricker and Philippe Robert and Yousra Chabchoub}, title = {Improving the Detection of On-Line Vertical Port Scan in {IP} Traffic}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {61--74}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010104}, doi = {10.4018/IJSSE.2014010104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/FrickerRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/HovsepyanSSJ14, author = {Aram Hovsepyan and Riccardo Scandariato and Maximilian Steff and Wouter Joosen}, title = {Design Churn as Predictor of Vulnerabilities?}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {3}, pages = {16--31}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014070102}, doi = {10.4018/IJSSE.2014070102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/HovsepyanSSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KobashiYKWOF14, author = {Takanori Kobashi and Nobukazu Yoshioka and Haruhiko Kaiya and Hironori Washizaki and Takao Okubo and Yoshiaki Fukazawa}, title = {Validating Security Design Pattern Applications by Testing Design Models}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {4}, pages = {1--30}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014100101}, doi = {10.4018/IJSSE.2014100101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KobashiYKWOF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/LudinardTTNKAAB14, author = {Romaric Ludinard and Eric Totel and Fr{\'{e}}d{\'{e}}ric Tronel and Vincent Nicomette and Mohamed Ka{\^{a}}niche and Eric Alata and Rim Akrout and Yann Bachy}, title = {An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {19--38}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010102}, doi = {10.4018/IJSSE.2014010102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/LudinardTTNKAAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MelandPGPDG14, author = {Per H{\aa}kon Meland and Elda Paja and Erlend Andreas Gj{\ae}re and St{\'{e}}phane Paul and Fabiano Dalpiaz and Paolo Giorgini}, title = {Threat Analysis in Goal-Oriented Security Requirements Modelling}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {2}, pages = {1--19}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014040101}, doi = {10.4018/IJSSE.2014040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MelandPGPDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ShahriarNCM14, author = {Hossain Shahriar and Sarah North and Wei{-}Chuen Chen and Edward Mawangi}, title = {Information Theoretic {XSS} Attack Detection in Web Applications}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {3}, pages = {1--15}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014070101}, doi = {10.4018/IJSSE.2014070101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ShahriarNCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/SongCM14, author = {Mingqiu Song and Donghao Chen and Elizabeth Sylvester Mkoba}, title = {Secure Software Development Assimilation: Effects of External Pressures and Roles of Internal Factors}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {3}, pages = {32--55}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014070103}, doi = {10.4018/IJSSE.2014070103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/SongCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/TetmeyerHS14, author = {Annette Tetmeyer and Daniel D. Hein and Hossein Saiedian}, title = {A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {4}, pages = {31--47}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014100102}, doi = {10.4018/IJSSE.2014100102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/TetmeyerHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/ToumiCA14, author = {Khalifa Toumi and Ana R. Cavalli and C{\'{e}}sar Andr{\'{e}}s}, title = {Validation of a Trust Approach in Multi-Organization Environments}, journal = {Int. J. Secur. Softw. Eng.}, volume = {5}, number = {1}, pages = {1--18}, year = {2014}, url = {https://doi.org/10.4018/ijsse.2014010101}, doi = {10.4018/IJSSE.2014010101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/ToumiCA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.