The SCEAS System
Navigation Menu

Search the dblp DataBase


Joshua J. Pauli: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dianxiang Xu, Joshua J. Pauli
    Threat-Driven Architectural Design of Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:136-143 [Conf]
  2. Joshua J. Pauli, Dianxiang Xu
    Misuse Case-Based Design and Analysis of Secure Software Architecture. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:398-403 [Conf]
  3. Joshua J. Pauli, Dianxiang Xu
    Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems. [Citation Graph (0, 0)][DBLP]
    SEKE, 2006, pp:392-397 [Conf]
  4. Joshua J. Pauli, Dianxiang Xu
    Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study. [Citation Graph (0, 0)][DBLP]
    MSVVEIS, 2005, pp:89-95 [Conf]
  5. Joshua J. Pauli, Dianxiang Xu
    Integrating Functional and Security Requirements with Use Case Decomposition. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2006, pp:57-66 [Conf]
  6. Joshua J. Pauli
    Leveraging the TABLETPC in systems analysis and design courses. [Citation Graph (0, 0)][DBLP]
    SEDE, 2007, pp:302-307 [Conf]
  7. Joshua J. Pauli
    Breaking "EXTENDS" relationships for use/misuse/mitigation use case refinement. [Citation Graph (0, 0)][DBLP]
    SEDE, 2007, pp:76-80 [Conf]

  8. Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary. [Citation Graph (, )][DBLP]

  9. An Ethical Network Hacking Contest for Undergraduate Student Recruitment. [Citation Graph (, )][DBLP]

  10. Towards a Specification Prototype for Hierarchy-Driven Attack Patterns. [Citation Graph (, )][DBLP]

  11. Incentive-Based Technology Start-Up Program for Undergraduate Students. [Citation Graph (, )][DBLP]

  12. Hierarchy-Driven Approach for Attack Patterns in Software Security Education. [Citation Graph (, )][DBLP]

  13. Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002