default search action
Search dblp for Publications
export results for "toc:db/journals/ijsse/ijsse4.bht:"
@article{DBLP:journals/ijsse/AlaviIJA13, author = {Reza Alavi and Shareeful Islam and Hamid Jahankhani and Ameer Al{-}Nemrat}, title = {Analyzing Human Factors for an Effective Information Security Management System}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {50--74}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010104}, doi = {10.4018/JSSE.2013010104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/AlaviIJA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/CaldeiraSVMSBK13, author = {Filipe Caldeira and Thomas Schaberreiter and S{\'{e}}bastien Varrette and Edmundo Monteiro and Paulo Sim{\~{o}}es and Pascal Bouvry and Djamel Khadraoui}, title = {Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {4}, pages = {47--69}, year = {2013}, url = {https://doi.org/10.4018/ijsse.2013100103}, doi = {10.4018/IJSSE.2013100103}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/CaldeiraSVMSBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Corcalciuc13, author = {Horia V. Corcalciuc}, title = {A Taxonomy Built on Layers of Abstraction for Time and State Vulnerabilities}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {2}, pages = {40--66}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013040103}, doi = {10.4018/JSSE.2013040103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Corcalciuc13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/Crawford13, author = {Jeff Crawford}, title = {Assessing the Value of Formal Control Mechanisms on Strong Password Selection}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {1--17}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070101}, doi = {10.4018/JSSE.2013070101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/Crawford13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DubreuilBTL13, author = {Jean Dubreuil and Guillaume Bouffard and Bhagyalekshmy N. Thampi and Jean{-}Louis Lanet}, title = {Mitigating Type Confusion on Java Card}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {2}, pages = {19--39}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013040102}, doi = {10.4018/JSSE.2013040102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DubreuilBTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/KaiyaSOK13, author = {Haruhiko Kaiya and Junya Sakai and Shinpei Ogata and Kenji Kaijiri}, title = {Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {42--63}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070103}, doi = {10.4018/JSSE.2013070103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/KaiyaSOK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MatsunoY13, author = {Yutaka Matsuno and Shuichiro Yamamoto}, title = {A New Method for Writing Assurance Cases}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {31--49}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010103}, doi = {10.4018/JSSE.2013010103}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MatsunoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MeadSW13, author = {Nancy R. Mead and Daniel Shoemaker and Carol Woody}, title = {Principles and Measurement Models for Software Assurance}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {1--10}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010101}, doi = {10.4018/JSSE.2013010101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MeadSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MelandG13, author = {Per H{\aa}kon Meland and Erlend Andreas Gj{\ae}re}, title = {Threat Representation Methods for Composite Service Process Models}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {2}, pages = {1--18}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013040101}, doi = {10.4018/JSSE.2013040101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MelandG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MillerAGA13, author = {Simon Miller and Susan Appleby and Jonathan M. Garibaldi and Uwe Aickelin}, title = {Towards a More Systematic Approach to Secure Systems Design and Analysis}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {11--30}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010102}, doi = {10.4018/JSSE.2013010102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MillerAGA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/MurvayG13, author = {Pal{-}Stefan Murvay and Bogdan Groza}, title = {Performance Evaluation of {SHA-2} Standard vs. {SHA-3} Finalists on Two Freescale Platforms}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {4}, pages = {1--24}, year = {2013}, url = {https://doi.org/10.4018/ijsse.2013100101}, doi = {10.4018/IJSSE.2013100101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/MurvayG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/RjaibiRAM13, author = {Neila Rjaibi and Latifa Ben Arfa Rabai and Anis Ben Aissa and Ali Mili}, title = {Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {64--81}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070104}, doi = {10.4018/JSSE.2013070104}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/RjaibiRAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/VugrinT13, author = {Eric D. Vugrin and Jennifer Turgeon}, title = {Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessments}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {1}, pages = {75--96}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013010105}, doi = {10.4018/JSSE.2013010105}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/VugrinT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/WangLRK13, author = {Li Wang and Zheng Li and Shangping Ren and Kevin A. Kwiat}, title = {Optimal Voting Strategy against Random and Targeted Attacks}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {4}, pages = {25--46}, year = {2013}, url = {https://doi.org/10.4018/ijsse.2013100102}, doi = {10.4018/IJSSE.2013100102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/WangLRK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/WuGS13, author = {Yan Wu and Robin A. Gandhi and Harvey P. Siy}, title = {Semi-Automatic Annotation of Natural Language Vulnerability Reports}, journal = {Int. J. Secur. Softw. Eng.}, volume = {4}, number = {3}, pages = {18--41}, year = {2013}, url = {https://doi.org/10.4018/jsse.2013070102}, doi = {10.4018/JSSE.2013070102}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsse/WuGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.