Search dblp for Publications

export results for "toc:db/journals/ijsse/ijsse5.bht:"

 download as .bib file

@article{DBLP:journals/ijsse/BeckersCGGH14,
  author       = {Kristian Beckers and
                  Isabelle C{\^{o}}t{\'{e}} and
                  Ludger Goeke and
                  Selim G{\"{u}}ler and
                  Maritta Heisel},
  title        = {A Structured Method for Security Requirements Elicitation concerning
                  the Cloud Computing Domain},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {20--43},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014040102},
  doi          = {10.4018/IJSSE.2014040102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/BeckersCGGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/CianciaMMMPP14,
  author       = {Vincenzo Ciancia and
                  Jos{\'{e}} Antonio Mart{\'{\i}}n and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Marinella Petrocchi and
                  Ernesto Pimentel},
  title        = {Automated Synthesis and Ranking of Secure {BPMN} Orchestrators},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {44--64},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014040103},
  doi          = {10.4018/IJSSE.2014040103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/CianciaMMMPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/CobourneKMM14,
  author       = {Sheila Cobourne and
                  Lazaros Kyrillidis and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Remote E-Voting Using the Smart Card Web Server},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {39--60},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014010103},
  doi          = {10.4018/IJSSE.2014010103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/CobourneKMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/EssafiG14,
  author       = {Mehrez Essafi and
                  Henda Ben Gh{\'{e}}zala},
  title        = {Meta-Modeling Based Secure Software Development Processes},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {56--74},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014070104},
  doi          = {10.4018/IJSSE.2014070104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/EssafiG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FeldererKKJOPTT14,
  author       = {Michael Felderer and
                  Basel Katt and
                  Philipp Kalb and
                  Jan J{\"{u}}rjens and
                  Mart{\'{\i}}n Ochoa and
                  Federica Paci and
                  Le Minh Sang Tran and
                  Thein Than Tun and
                  Koen Yskout and
                  Riccardo Scandariato and
                  Frank Piessens and
                  Dries Vanoverberghe and
                  Elizabeta Fourneret and
                  Matthias Gander and
                  Bj{\o}rnar Solhaug and
                  Ruth Breu},
  title        = {Evolution of Security Engineering Artifacts: {A} State of the Art
                  Survey},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {48--98},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014100103},
  doi          = {10.4018/IJSSE.2014100103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/FeldererKKJOPTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/FrickerRC14,
  author       = {Christine Fricker and
                  Philippe Robert and
                  Yousra Chabchoub},
  title        = {Improving the Detection of On-Line Vertical Port Scan in {IP} Traffic},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {61--74},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014010104},
  doi          = {10.4018/IJSSE.2014010104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/FrickerRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/HovsepyanSSJ14,
  author       = {Aram Hovsepyan and
                  Riccardo Scandariato and
                  Maximilian Steff and
                  Wouter Joosen},
  title        = {Design Churn as Predictor of Vulnerabilities?},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {16--31},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014070102},
  doi          = {10.4018/IJSSE.2014070102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/HovsepyanSSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/KobashiYKWOF14,
  author       = {Takanori Kobashi and
                  Nobukazu Yoshioka and
                  Haruhiko Kaiya and
                  Hironori Washizaki and
                  Takao Okubo and
                  Yoshiaki Fukazawa},
  title        = {Validating Security Design Pattern Applications by Testing Design
                  Models},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {1--30},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014100101},
  doi          = {10.4018/IJSSE.2014100101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/KobashiYKWOF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/LudinardTTNKAAB14,
  author       = {Romaric Ludinard and
                  Eric Totel and
                  Fr{\'{e}}d{\'{e}}ric Tronel and
                  Vincent Nicomette and
                  Mohamed Ka{\^{a}}niche and
                  Eric Alata and
                  Rim Akrout and
                  Yann Bachy},
  title        = {An Invariant-Based Approach for Detecting Attacks Against Data in
                  Web Applications},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {19--38},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014010102},
  doi          = {10.4018/IJSSE.2014010102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/LudinardTTNKAAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/MelandPGPDG14,
  author       = {Per H{\aa}kon Meland and
                  Elda Paja and
                  Erlend Andreas Gj{\ae}re and
                  St{\'{e}}phane Paul and
                  Fabiano Dalpiaz and
                  Paolo Giorgini},
  title        = {Threat Analysis in Goal-Oriented Security Requirements Modelling},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {2},
  pages        = {1--19},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014040101},
  doi          = {10.4018/IJSSE.2014040101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/MelandPGPDG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ShahriarNCM14,
  author       = {Hossain Shahriar and
                  Sarah North and
                  Wei{-}Chuen Chen and
                  Edward Mawangi},
  title        = {Information Theoretic {XSS} Attack Detection in Web Applications},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {1--15},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014070101},
  doi          = {10.4018/IJSSE.2014070101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/ShahriarNCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/SongCM14,
  author       = {Mingqiu Song and
                  Donghao Chen and
                  Elizabeth Sylvester Mkoba},
  title        = {Secure Software Development Assimilation: Effects of External Pressures
                  and Roles of Internal Factors},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {32--55},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014070103},
  doi          = {10.4018/IJSSE.2014070103},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/SongCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/TetmeyerHS14,
  author       = {Annette Tetmeyer and
                  Daniel D. Hein and
                  Hossein Saiedian},
  title        = {A Tagging Approach to Extract Security Requirements in Non-Traditional
                  Software Development Processes},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {4},
  pages        = {31--47},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014100102},
  doi          = {10.4018/IJSSE.2014100102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/TetmeyerHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/ToumiCA14,
  author       = {Khalifa Toumi and
                  Ana R. Cavalli and
                  C{\'{e}}sar Andr{\'{e}}s},
  title        = {Validation of a Trust Approach in Multi-Organization Environments},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {5},
  number       = {1},
  pages        = {1--18},
  year         = {2014},
  url          = {https://doi.org/10.4018/ijsse.2014010101},
  doi          = {10.4018/IJSSE.2014010101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/ToumiCA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics