Follow
Josh Pauli, Ph.D.
Josh Pauli, Ph.D.
Verified email at dsu.edu - Homepage
Title
Cited by
Cited by
Year
Misuse case-based design and analysis of secure software architecture
JJ Pauli, D Xu
International Conference on Information Technology: Coding and Computing …, 2005
682005
Threat-driven architectural design of secure information systems
J Pauli, D Xu
International Conference on Enterprise Information Systems 4, 136-143, 2005
382005
Threat-driven design and analysis of secure software architectures
D Xu, J Pauli
Journal of Information Assurance and Security 1 (3), 171-180, 2006
282006
Improving the efficiency and effectiveness of penetration test automation
KP Haubris, JJ Pauli
2013 10th International Conference on Information Technology: New …, 2013
262013
Integrating functional and security requirements with use case decomposition
J Pauli, D Xu
11th IEEE International Conference on Engineering of Complex Computer …, 2006
262006
Towards a specification prototype for hierarchy-driven attack patterns
JJ Pauli, PH Engebretson
Fifth International Conference on Information Technology: New Generations …, 2008
212008
Hierarchy-driven approach for attack patterns in software security education
JJ Pauli, PH Engebretson
Fifth International Conference on Information Technology: New Generations …, 2008
102008
CookieMonster: Automated session hijacking archival and analysis
JJ Pauli, PH Engebretson, MJ Ham, MCJ Zautke
2011 Eighth International Conference on Information Technology: New …, 2011
82011
Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary.
PH Engebretson, JJ Pauli, K Streff
Security and Management, 245-250, 2008
62008
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study.
JJ Pauli, D Xu
MSVVEIS, 89-95, 2005
62005
Refining use/misuse/mitigation use cases for security requirements
JJ Pauli
Journal of Software Engineering and Applications 7 (08), 626, 2014
52014
Work in progress—web penetration testing: effectiveness of student learning in Web application security
HJ Kam, JJ Pauli
2011 Frontiers in Education Conference (FIE), F3G-1-F3G-3, 2011
52011
Leveraging parent mitigations and threats for capec-driven hierarchies
PH Engebretson, JJ Pauli
2009 Sixth International Conference on Information Technology: New …, 2009
52009
Filling your cyber operations training toolbox
J Pauli, P Engebretson
IEEE Security & Privacy 10 (5), 71-74, 2012
42012
Lessons Learned from an Evolving Information Assurance Lab
PH ENGEBRETSON, JJ Pauli, J Bosma
SAM 2010: proceedings of the 2010 international conference on security …, 2010
22010
A Cradle-to-Grave Approach to Retaining Students in Information Security Programs
JJ Pauli, PH Engebretson
SAM 2010: proceedings of the 2010 international conference on security …, 2010
22010
Incentive-based technology start-up program for undergraduate students
JJ Pauli
Fifth International Conference on Information Technology: New Generations …, 2008
22008
An Ethical Network Hacking Contest for Undergraduate Student Recruitment.
PH Engebretson, JJ Pauli, K Streff
FECS, 68-74, 2008
22008
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems.
JJ Pauli, D Xu
SEKE, 392-397, 2006
22006
Realizing Knock-Out Effect and Parent Mitigation Power for Detailed Attack Patterns: A Case Study
PH Engebretson, JJ Pauli
Proceedings of the 9th IASTED International Conference 632 (016), 39, 2008
12008
The system can't perform the operation now. Try again later.
Articles 1–20