Security Engineering for Lifelong Evolvable Systems

Publications

Export 42 results:
Sort by: Author [ Title  (Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R [S] T U V W X Y Z   [Show ALL]
M
Butler, S., M. Wermelinger, Y. Yu, and H. Sharp, "Mining Java class naming conventions", 27th IEEE International Conference on Software Maintenance: IEEE, 2011. Abstract
J
I
Jürjens, J., L. Marchal, M. Ochoa, and H. Schmidt, "Incremental Security Verification for Evolving UMLsec models", Proc. of the 7th European Conference on Modelling Foundations and Applications (ECMFA'11), Birmingham, UK, pp. 52-68, 2011.
E
Massacci, F., J. Mylopoulos, F. Paci, T. T. Tun, and Y. Yu, "An Extended Ontology for Security Requirements", Advanced Information Systems Engineering Workshops, vol. 83: Springer Berlin Heidelberg, pp. 622-636, 2011. Abstract

10.1007/978-3-642-22056-2_64

Felici, M., V. Meduri, B. Solhaug, and A. Tedeschi, "Evolutionary risk analysis: Expert judgement", Computer safety, reliability, and security (SAFECOMP), Italy, Springer, 09/2011.
Omerovic, A., B. Solhaug, and K. Stølen, "Evaluation of experiences from applying the PREDIQT method in an industrial case study", Secure System Integration and Reliability Improvement (SSIRI), Korea, IEEE Computer Society, 06/2011.
C
B
Philippaerts, P., F. Vogels, J. Smans, B. Jacobs, and F. Piessens, "The Belgian electronic identity card: a verification case study", Proceedings of the International Workshop Automated Verification of Critical Systems (AVOCS'11): Elsevier, 2011.

Newcastle (UK), 12-14 September 2011, to appear

A