default search action
Search dblp for Publications
export results for "toc:db/conf/icse/sead2018.bht:"
@inproceedings{DBLP:conf/icse/AlrimawiPMN18, author = {Faeq Alrimawi and Liliana Pasquale and Deepak Mehta and Bashar Nuseibeh}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {I've seen this before: sharing cyber-physical incident knowledge}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {33--40}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194714}, doi = {10.1145/3194707.3194714}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/AlrimawiPMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BergheYJ18, author = {Alexander van Den Berghe and Koen Yskout and Wouter Joosen}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Security patterns 2.0: towards security patterns based on security building blocks}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {45--48}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194715}, doi = {10.1145/3194707.3194715}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BergheYJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/KrishnamurthyMH18, author = {Rohan Krishnamurthy and Michael Meinel and Carina Haupt and Andreas Schreiber and Patrick M{\"{a}}der}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {{DLR} secure software engineering: position and vision paper}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {49--50}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194716}, doi = {10.1145/3194707.3194716}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/KrishnamurthyMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LindenRWW18, author = {Dirk van der Linden and Awais Rashid and Emma J. Williams and Bogdan Warinschi}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Safe cryptography for all: towards visual metaphor driven cryptography building blocks}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {41--44}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194709}, doi = {10.1145/3194707.3194709}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/LindenRWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/LopezTBLNS18, author = {Tamara Lopez and Thein Than Tun and Arosha K. Bandara and Mark Levine and Bashar Nuseibeh and Helen Sharp}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {An investigation of security conversations in stack overflow: perceptions of security and community involvement}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {26--32}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194713}, doi = {10.1145/3194707.3194713}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/LopezTBLNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/PerumaK18a, author = {Anthony Peruma and Daniel E. Krutz}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Understanding the relationship between quality and security: a large-scale analysis of Android applications}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {19--25}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194711}, doi = {10.1145/3194707.3194711}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/PerumaK18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/PerumaMK18, author = {Anthony Peruma and Samuel A. Malachowsky and Daniel E. Krutz}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Providing an experiential cybersecurity learning experience through mobile security labs}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {51--54}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194712}, doi = {10.1145/3194707.3194712}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/PerumaMK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Rotella18, author = {Pete Rotella}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Software security vulnerabilities: baselining and benchmarking}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {3--10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194708}, doi = {10.1145/3194707.3194708}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/Rotella18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SionYLJ18a, author = {Laurens Sion and Koen Yskout and Dimitri Van Landuyt and Wouter Joosen}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Risk-based design security analysis}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {11--18}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194710}, doi = {10.1145/3194707.3194710}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/SionYLJ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/Williams18, author = {Laurie A. Williams}, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Continuously integrating security}, booktitle = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, pages = {1--2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707.3194717}, doi = {10.1145/3194707.3194717}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/Williams18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse/2018sead, editor = {Mehdi Mirakhorli and Matthias Galster}, title = {Proceedings of the 1st International Workshop on Security Awareness from Design to Deployment, SEAD@ICSE 2018, Gothenburg, Sweden, May 27, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3194707}, doi = {10.1145/3194707}, isbn = {978-1-4503-5727-2}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/2018sead.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.