default search action
International Journal of Secure Software Engineering, Volume 4
Volume 4, Number 1, 2013
- Nancy R. Mead, Daniel Shoemaker, Carol Woody:
Principles and Measurement Models for Software Assurance. 1-10 - Simon Miller, Susan Appleby, Jonathan M. Garibaldi, Uwe Aickelin:
Towards a More Systematic Approach to Secure Systems Design and Analysis. 11-30 - Yutaka Matsuno, Shuichiro Yamamoto:
A New Method for Writing Assurance Cases. 31-49 - Reza Alavi, Shareeful Islam, Hamid Jahankhani, Ameer Al-Nemrat:
Analyzing Human Factors for an Effective Information Security Management System. 50-74 - Eric D. Vugrin, Jennifer Turgeon:
Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessments. 75-96
Volume 4, Number 2, 2013
- Per Håkon Meland, Erlend Andreas Gjære:
Threat Representation Methods for Composite Service Process Models. 1-18 - Jean Dubreuil, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
Mitigating Type Confusion on Java Card. 19-39 - Horia V. Corcalciuc:
A Taxonomy Built on Layers of Abstraction for Time and State Vulnerabilities. 40-66
Volume 4, Number 3, 2013
- Jeff Crawford:
Assessing the Value of Formal Control Mechanisms on Strong Password Selection. 1-17 - Yan Wu, Robin A. Gandhi, Harvey P. Siy:
Semi-Automatic Annotation of Natural Language Vulnerability Reports. 18-41 - Haruhiko Kaiya, Junya Sakai, Shinpei Ogata, Kenji Kaijiri:
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment. 42-63 - Neila Rjaibi, Latifa Ben Arfa Rabai, Anis Ben Aissa, Ali Mili:
Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study. 64-81
Volume 4, Number 4, 2013
- Pal-Stefan Murvay, Bogdan Groza:
Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms. 1-24 - Li Wang, Zheng Li, Shangping Ren, Kevin A. Kwiat:
Optimal Voting Strategy against Random and Targeted Attacks. 25-46 - Filipe Caldeira, Thomas Schaberreiter, Sébastien Varrette, Edmundo Monteiro, Paulo Simões, Pascal Bouvry, Djamel Khadraoui:
Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures. 47-69
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.