The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESSoS"( http://dblp.L3S.de/Venues/ESSoS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/essos

Publication years (Num. hits)
2009 (18) 2010 (19) 2011 (22) 2012 (15) 2013 (16) 2014 (16) 2015 (17) 2016 (18) 2017 (16) 2018 (11)
Publication types (Num. hits)
inproceedings(158) proceedings(10)
Venues (Conferences, Journals, ...)
ESSoS(168)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 168 publication records. Showing 168 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Francisco Moyano, M. Carmen Fernández Gago, Isaac Agudo, Javier López 0001 A Task Ordering Approach for Automatic Trust Establishment. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Martín Ochoa, Jan Jürjens, Daniel Warzecha A Sound Decision Procedure for the Compositionality of Secrecy. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis Hunting Application-Level Logical Errors. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peter T. Breuer, Jonathan P. Bowen Typed Assembler for a RISC Crypto-Processor. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang 0001 Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Hong Xiao Optimal Trust Mining and Computing on Keyed MapReduce. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gilles Barthe, Benjamin Livshits, Riccardo Scandariato (eds.) Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mehrdad Saadatmand, Antonio Cicchetti, Mikael Sjödin Design of Adaptive Security Mechanisms for Real-Time Embedded Systems. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns, Wouter Joosen SessionShield: Lightweight Protection against Session Hijacking. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Steffen Bartsch Authorization Enforcement Usability Case Study. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Úlfar Erlingsson, Roel J. Wieringa, Nicola Zannone (eds.) Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, Stephan Neuhaus, Viet Hung Nguyen After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jing Xie 0011, Bill Chu, Heather Richter Lipford Idea: Interactive Support for Secure Software Development. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Linda Ariani Gunawan, Frank Alexander Kraemer, Peter Herrmann A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ingo Müller 0001, Jun Han 0004, Jean-Guy Schneider, Steven Versteeg Idea: A Reference Platform for Systematic Information Security Management Tool Support. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Philippe De Ryck, Lieven Desmet, Wouter Joosen Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Benjamin Aziz, Alvaro E. Arenas, Michael D. Wilson Model-Based Refinement of Security Policies in Collaborative Virtual Organisations. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Naveed Ahmed 0005, Christian Damsgaard Jensen Adaptable Authentication Model: Exploring Security with Weaker Attacker Models. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wihem Arsac, Luca Compagna, Giancarlo Pellegrino, Serena Elisa Ponta Security Validation of Business Processes via Model-Checking. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner Idea: Simulation Based Security Requirement Verification for Transaction Level Models. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thanh-Binh Dao, Etsuya Shibayama Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ricardo Corin, Felipe Andrés Manzano Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Arnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl On-Device Control Flow Verification for Java Programs. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt 0001, Yijun Yu The Security Twin Peaks. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Felderer, Berthold Agreiter, Ruth Breu Evolution of Security Requirements Tests for Service-Centric Systems. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nataliia Bielova, Fabio Massacci Predictability of Enforcement. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michaela Bunke, Karsten Sohr An Architecture-Centric Approach to Detecting Security Patterns in Software. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1David J. Power, Mark Slaymaker, Andrew Simpson Automatic Conformance Checking of Role-Based Access Control Policies via Alloy. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tom Goovaerts, Lieven Desmet, Wouter Joosen Scalable Authorization Middleware for Service Oriented Architectures. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jörn Eichler Lightweight Modeling and Analysis of Security Concepts. Search on Bibsonomy ESSoS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1James Walden, Maureen Doyle, Robert Lenhof, John Murray Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Hammer 0001 Experiences with PDG-Based IFC. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alfredo Pironti 0001, Jan Jürjens Formally-Based Black-Box Monitoring of Security Protocols. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Martin Johns, Christian Beyerlein, Rosemaria Giesecke, Joachim Posegga Secure Code Generation for Web Applications. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nina Moebius, Kurt Stenzel, Wolfgang Reif Formal Verification of Application-Specific Security Properties in a Model-Driven Approach. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aida Omerovic, Anette Andresen, Håvard Grindheim, Per Myrseth, Atle Refsdal, Ketil Stølen, Jon Ølnes Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ben H. Smith, Laurie A. Williams, Andrew Austin Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Karsten Sohr, Bernhard J. Berger Idea: Towards Architecture-Centric Security Analysis of Software. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Francesco Gadaleta, Yves Younan, Wouter Joosen BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Albin Zuccato, Nils Daniels, Cheevarat Jampathom, Mikael Nilson Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Giacomo A. Galilei, Vincenzo Gervasi Idea: Enforcing Consumer-Specified Security Properties for Modular Software. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Clara Bertolissi, Maribel Fernández Category-Based Authorisation Models: Operational Semantics and Expressive Power. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Per Håkon Meland, Inger Anne Tøndel, Jostein Jensen Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Igor Santos, Felix Brezo, Javier Nieves, Yoseba K. Penya, Borja Sanz 0001, Carlos Laorden, Pablo García Bringas Idea: Opcode-Sequence-Based Malware Detection. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Achim D. Brucker, Helmut Petritsch Idea: Efficient Evaluation of Access Control Constraints. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1David A. Basin, Manuel Clavel, Marina Egea, Michael Schläpfer Automatic Generation of Smart, Security-Aware GUI Models. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain Model-Driven Security Policy Deployment: Property Oriented Approach. Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, Dan S. Wallach, Nicola Zannone (eds.) Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings Search on Bibsonomy ESSoS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ron van der Meyden Architectural Refinement and Notions of Intransitive Noninterference. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Holger Schmidt 0001 Pattern-Based Confidentiality-Preserving Refinement. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Timothy E. Levin, Cynthia E. Irvine, Terry Benzel, Thuy D. Nguyen, Paul C. Clark, Ganesha Bhaskara Idea: Trusted Emergency Management. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Feng Chen 0015, Jinshu Su, Yi Zhang A Scalable Approach to Full Attack Graphs Generation. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jason Hiser, Clark L. Coleman, Michele Co, Jack W. Davidson MEDS: The Memory Error Detection System. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christian Wolter, Philip Miseldine, Christoph Meinel Verification of Business Process Entailment Constraints Using SPIN. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michael Gegick, Pete Rotella, Laurie A. Williams Toward Non-security Failures as a Predictor of Security Faults and Failures. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone (eds.) Engineering Secure Software and Systems, First International Symposium ESSoS 2009, Leuven, Belgium, February 4-6, 2009. Proceedings Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Laurie A. Williams, Michael Gegick, Andrew Meneely Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Munawar Hafiz, Paul Adamczyk, Ralph E. Johnson Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thanh-Binh Dao, Etsuya Shibayama Idea: Automatic Security Testing for Web Applications. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1James Walden, Adam Messer, Alex Kuhl Idea: Measuring the Effect of Code Complexity on Static Analysis Results. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pratyusa K. Manadhata, Yücel Karabulut, Jeannette M. Wing Report: Measuring the Attack Surfaces of Enterprise Software. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Albin Zuccato, Clemens Kögler Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pieter Philippaerts, Cédric Boon, Frank Piessens Report: Extensibility and Implementation Independence of the .NET Cryptographic API. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Ilaria Matteucci Idea: Action Refinement for Security Properties Enforcement. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel, Karl Klose From Formal Access Control Policies to Runtime Enforcement Aspects. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robin Sharp Report: CC-Based Design of Secure Application Systems. Search on Bibsonomy ESSoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #168 of 168 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license