


default search action
International Journal of Secure Software Engineering, Volume 6
Volume 6, Number 1, 2015
- Nancy R. Mead, Jose Andre Morales
, Gregory Paul Alice:
A Method and Case Study for Using Malware Analysis to Improve Security Requirements. 1-23 - Azadeh Alebrahim, Denis Hatebur, Stephan Faßbender, Ludger Goeke, Isabelle Côté:
A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems. 24-46 - Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, Christian Kreiner:
Balancing Product and Process Assurance for Evolving Security Systems. 47-75
Volume 6, Number 2, 2015
- Richard Gay, Heiko Mantel, Henning Sudbrock:
An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels. 1-22 - Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh
:
Calculating Quantitative Integrity and Secrecy for Imperative Programs. 23-46 - Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin
:
Using Attack Graphs to Analyze Social Engineering Threats. 47-69 - Alessandro Armando, Michele Bezzi, Nadia Metoui
, Antonino Sabetta:
Risk-Based Privacy-Aware Information Disclosure. 70-89 - Gencer Erdogan, Fredrik Seehusen, Ketil Stølen, Jon Hofstad, Jan Øyvind Aagedal:
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies. 90-112
Volume 6, Number 3, 2015
- Hossain Shahriar, Hisham M. Haddad, Vamshee Krishna Devendran:
Request and Response Analysis Framework for Mitigating Clickjacking Attacks. 1-25 - Seiji Munetoh
, Nobukazu Yoshioka:
Method Using Command Abstraction Library for Iterative Testing Security of Web Applications. 26-49 - Bouchaib Falah, Mohammed Akour, Samia Oukemeni:
An Alternative Threat Model-based Approach for Security Testing. 50-64
Volume 6, Number 4, 2015
- Mohamed El-Attar:
Supporting Consistency during the Development and Evolution of Quality Unified Use-Misuse Case Models. 1-31 - Neila Rjaibi, Latifa Ben Arfa Rabai
:
Expansion and Practical Implementation of the MFC Cybersecurity Model via a Novel Security Requirements Taxonomy. 32-51 - Mehdi Dadkhah, Shahaboddin Shamshirband:
An Introduction to Remote Installation Vulnerability in Content Management Systems. 52-63

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.