The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SESS@ICSE"( http://dblp.L3S.de/Venues/SESS@ICSE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icse

Publication years (Num. hits)
2005 (17) 2006-2007 (22) 2009-2010 (22) 2011 (9)
Publication types (Num. hits)
inproceedings(64) proceedings(6)
Venues (Conferences, Journals, ...)
SESS@ICSE(70)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 70 publication records. Showing 70 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nadira Lammari, Jean-Sylvain Bucumi, Jacky Akoka, Isabelle Comyn-Wattiau A conceptual meta-model for secured information systems. Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Ilaria Matteucci Preserving security properties under refinement. Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1KiSeok Bae, MahnKi Ahn, Hoon-Jae Lee 0001, JaeCheol Ha, Sang-Jae Moon Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper). Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yonghee Shin, Laurie A. Williams An initial study on the use of execution complexity metrics as indicators of software vulnerabilities. Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David R. Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde 0002, Brian Mastropietro PEASOUP: preventing exploits against software of uncertain provenance (position paper). Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jan Jürjens, Seok-Won Lee, Mattia Monga (eds.) Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011 Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  BibTeX  RDF
1Michael Todd Gamble, Rose F. Gamble, Matthew L. Hale Security policy foundations in context UNITY. Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Koen Buyens, Riccardo Scandariato, Wouter Joosen Composition of least privilege analysis results in software architectures (position paper). Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Naved Ahmed, Raimundas Matulevicius Towards transformation guidelines from secure tropos to misuse cases (position paper). Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shamal Faily, Ivan Flechais A meta-model for usable secure requirements engineering. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sven Lachmund Auto-generating access control policies for applications by static analysis with user input recognition. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Seok-Won Lee, Mattia Monga, Jan Jürjens (eds.) ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  BibTeX  RDF
1Yan Wu 0018, Robin A. Gandhi, Harvey P. Siy Using semantic templates to study vulnerabilities recorded in large software repositories. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tanveer Mustafa, Michael Drouineaud, Karsten Sohr Towards formal specification and verification of a role-based authorization engine using JML. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markus Luckey, Andrea Baumann, Daniel Méndez Fernández, Stefan Wagner 0001 Reusing security requirements using an extended quality model. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Angelo Ciampa, Corrado Aaron Visaggio, Massimiliano Di Penta A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1David Byers, Nahid Shahmehri Unified modeling of attacks, vulnerabilities and security activities. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jianning Geng, Lin Liu 0001, Barrett R. Bryant Towards a personalized privacy management framework. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sarah Al-Azzani, Rami Bahsoon Using implied scenarios in security testing. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andrea Avancini, Mariano Ceccato Towards security testing with taint analysis and genetic algorithms. Search on Bibsonomy SESS@ICSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Mohammad Zulkernine MUTEC: Mutation-based testing of Cross Site Scripting. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Munawar Hafiz, Ralph E. Johnson Improving perimeter security with security-oriented program transformations. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hrvoje Belani, Zeljka Car, Antun Caric RUP-based process model for security requirements engineering in value-added service development. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Würzinger, Christian Platzer, Christian Ludl, Engin Kirda, Christopher Kruegel SWAP: Mitigating XSS attacks using a reverse proxy. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David S. Allison, Hany F. El Yamany, Miriam A. M. Capretz Metamodel for privacy policies within SOA. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1 ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009 Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  BibTeX  RDF
1Mattia Monga, Roberto Paleari, Emanuele Passerini A hybrid analysis framework for detecting web application vulnerabilities. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Koen Buyens, Bart De Win, Wouter Joosen Resolving least privilege violations in software architectures. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nina Moebius, Kurt Stenzel, Wolfgang Reif Generating formal specifications for security-critical applications - A model-driven approach. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David Garcia Rosado, Eduardo Fernández-Medina, Javier López 0001 Reusable security use cases for mobile grid environments. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marwa El-Ghali, Wes Masri Intrusion detection using signatures extracted from execution profiles. Search on Bibsonomy SESS@ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Linzhang Wang, W. Eric Wong, Dianxiang Xu A Threat Model Driven Approach for Security Testing. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen An Analysis of the Security Patterns Landscape. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Thomas Raffetseder, Engin Kirda, Christopher Kruegel Building Anti-Phishing Browser Plug-Ins: An Experience Report. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Dries Vanoverberghe, Frank Piessens Supporting Security Monitor-Aware Development. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kun Xiao, Nianen Chen, Shangping Ren, Limin Shen, Xianhe Sun, Kevin A. Kwiat, Michael Macalik A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1 Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007 Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  BibTeX  RDF
1Stephen Thomas, Laurie A. Williams Using Automated Fix Generation to Secure SQL Statements. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen On the Secure Software Development Process: CLASP and SDL Compared. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Seok Won Lee, Robin A. Gandhi, Siddharth J. Wagle Towards a Requirements-Driven Workbench for Supporting Software Certification and Accreditation. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Andrea Lanzi, Lorenzo Martignoni, Mattia Monga, Roberto Paleari A Smart Fuzzer for x86 Executables. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Evan Martin, Tao Xie 0001 Automated Test Generation for Access Control Policies via Change-Impact Analysis. Search on Bibsonomy SESS@ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bart De Win, Frank Piessens, Wouter Joosen How secure is AOP and what can we do about it? Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Danilo Bruschi, Bart De Win, Mattia Monga (eds.) Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006 Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  BibTeX  RDF
1Danilo Bruschi, Bart De Win, Mattia Monga Introduction to software engineering for secure systems: SESS06 - secure by design. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marco Rolando, Matteo Rossi 0001, Niccolò Sanarico, Dino Mandrioli A formal approach to sensor placement and configuration in a network intrusion detection system. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gustav Boström, Jaana Wäyrynen, Marine Bodén, Konstantin Beznosov, Philippe Kruchten Extending XP practices to support security requirements engineering. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Seok Won Lee, Robin A. Gandhi, Divya Muthurajan, Deepak S. Yavagal, Gail-Joon Ahn Building problem domain ontology from security requirements in regulatory documents. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shin Nakajima 0001, Tetsuo Tamai Formal specification and analysis of JAAS framework. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kung Chen, Ju-Bing Chen On instrumenting obfuscated java bytecode with aspects. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Charles B. Haley, Jonathan D. Moffett, Robin C. Laney, Bashar Nuseibeh A framework for security requirements engineering. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shanai Ardi, David Byers, Nahid Shahmehri Towards a structured unified process for software security. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Martin Naedele, Thomas E. Koch Trust and tamper-proof software delivery. Search on Bibsonomy SESS@ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sam Weber, Paul A. Karger, Amit M. Paradkar A software flaw taxonomy: aiming tools at security. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Gegick, Laurie A. Williams Matching attack patterns to security vulnerabilities in software-intensive system designs. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ömer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter DISCOA: architectural adaptations for security and QoS. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Maarten Rits, Benjamin De Boe, Andreas Schaad XacT: a bridge between resource management and access control in multi-layered applications. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen Requirements traceability to support evolution of access control. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen Towards a unifying view on security contracts. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Karsten Sohr, Gail-Joon Ahn, Lars Migge Articulating and enforcing authorisation policies with UML and OCL. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel Enabling control over adaptive program transformation for dynamically evolving mobile software validation. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1John Viega Building security requirements with CLASP. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ben Breech, Lori L. Pollock A framework for testing security mechanisms for program-based attacks. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wes Masri, Andy Podgurski Using dynamic information flow analysis to detect attacks against applications. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Somo Banerjee, Chris A. Mattmann, Nenad Medvidovic, Leana Golubchik Leveraging architectural models to inject trust into software systems. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nancy R. Mead, Ted Stehney Security quality requirements engineering (SQUARE) methodology. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005 Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  BibTeX  RDF
1Jie Ren 0001, Richard N. Taylor, Paul Dourish, David F. Redmiles Towards an architectural treatment of software security: a connector-centric approach. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zaid Dwaikat, Francesco Parisi-Presicce Risky trust: risk-based analysis of software systems. Search on Bibsonomy SESS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #70 of 70 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license