Misuse case-based design and analysis of secure software architecture JJ Pauli, D Xu International Conference on Information Technology: Coding and Computing …, 2005 | 68 | 2005 |
Threat-driven architectural design of secure information systems J Pauli, D Xu International Conference on Enterprise Information Systems 4, 136-143, 2005 | 38 | 2005 |
Threat-driven design and analysis of secure software architectures D Xu, J Pauli Journal of Information Assurance and Security 1 (3), 171-180, 2006 | 28 | 2006 |
Improving the efficiency and effectiveness of penetration test automation KP Haubris, JJ Pauli 2013 10th International Conference on Information Technology: New …, 2013 | 26 | 2013 |
Integrating functional and security requirements with use case decomposition J Pauli, D Xu 11th IEEE International Conference on Engineering of Complex Computer …, 2006 | 26 | 2006 |
Towards a specification prototype for hierarchy-driven attack patterns JJ Pauli, PH Engebretson Fifth International Conference on Information Technology: New Generations …, 2008 | 21 | 2008 |
Hierarchy-driven approach for attack patterns in software security education JJ Pauli, PH Engebretson Fifth International Conference on Information Technology: New Generations …, 2008 | 10 | 2008 |
CookieMonster: Automated session hijacking archival and analysis JJ Pauli, PH Engebretson, MJ Ham, MCJ Zautke 2011 Eighth International Conference on Information Technology: New …, 2011 | 8 | 2011 |
Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary. PH Engebretson, JJ Pauli, K Streff Security and Management, 245-250, 2008 | 6 | 2008 |
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study. JJ Pauli, D Xu MSVVEIS, 89-95, 2005 | 6 | 2005 |
Refining use/misuse/mitigation use cases for security requirements JJ Pauli Journal of Software Engineering and Applications 7 (08), 626, 2014 | 5 | 2014 |
Work in progress—web penetration testing: effectiveness of student learning in Web application security HJ Kam, JJ Pauli 2011 Frontiers in Education Conference (FIE), F3G-1-F3G-3, 2011 | 5 | 2011 |
Leveraging parent mitigations and threats for capec-driven hierarchies PH Engebretson, JJ Pauli 2009 Sixth International Conference on Information Technology: New …, 2009 | 5 | 2009 |
Filling your cyber operations training toolbox J Pauli, P Engebretson IEEE Security & Privacy 10 (5), 71-74, 2012 | 4 | 2012 |
Lessons Learned from an Evolving Information Assurance Lab PH ENGEBRETSON, JJ Pauli, J Bosma SAM 2010: proceedings of the 2010 international conference on security …, 2010 | 2 | 2010 |
A Cradle-to-Grave Approach to Retaining Students in Information Security Programs JJ Pauli, PH Engebretson SAM 2010: proceedings of the 2010 international conference on security …, 2010 | 2 | 2010 |
Incentive-based technology start-up program for undergraduate students JJ Pauli Fifth International Conference on Information Technology: New Generations …, 2008 | 2 | 2008 |
An Ethical Network Hacking Contest for Undergraduate Student Recruitment. PH Engebretson, JJ Pauli, K Streff FECS, 68-74, 2008 | 2 | 2008 |
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems. JJ Pauli, D Xu SEKE, 392-397, 2006 | 2 | 2006 |
Realizing Knock-Out Effect and Parent Mitigation Power for Detailed Attack Patterns: A Case Study PH Engebretson, JJ Pauli Proceedings of the 9th IASTED International Conference 632 (016), 39, 2008 | 1 | 2008 |