Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/re/espre2014.bht:"
@inproceedings{DBLP:conf/re/AlebrahimHG14, author = {Azadeh Alebrahim and Denis Hatebur and Ludger Goeke}, title = {Pattern-based and {ISO} 27001 compliant risk analysis for cloud systems}, booktitle = {{ESPRE}}, pages = {42--47}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890527}, doi = {10.1109/ESPRE.2014.6890527}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/AlebrahimHG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/AlvaY14, author = {Aaron Alva and Lisa Young}, title = {{L-SQUARE:} Preliminary extension of the {SQUARE} methodology to address legal compliance}, booktitle = {{ESPRE}}, pages = {25--30}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890524}, doi = {10.1109/ESPRE.2014.6890524}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/AlvaY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HesseGRPSB14, author = {Tom{-}Michael Hesse and Stefan G{\"{a}}rtner and Tobias Roehm and Barbara Paech and Kurt Schneider and Bernd Bruegge}, title = {Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring}, booktitle = {{ESPRE}}, pages = {1--6}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890520}, doi = {10.1109/ESPRE.2014.6890520}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/HesseGRPSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/HibshiBRW14, author = {Hanan Hibshi and Travis D. Breaux and Maria Riaz and Laurie A. Williams}, title = {Towards a framework to measure security expertise in requirements analysis}, booktitle = {{ESPRE}}, pages = {13--18}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890522}, doi = {10.1109/ESPRE.2014.6890522}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/HibshiBRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/IonitaBW14, author = {Dan Ionita and Jan{-}Willem Bullee and Roel J. Wieringa}, title = {Argumentation-based security requirements elicitation: The next round}, booktitle = {{ESPRE}}, pages = {7--12}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890521}, doi = {10.1109/ESPRE.2014.6890521}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/IonitaBW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/MartinAY14, author = {Yod Samuel Mart{\'{\i}}n and Jos{\'{e}} M. del {\'{A}}lamo and Juan C. Yelmo}, title = {Engineering privacy requirements valuable lessons from another realm}, booktitle = {{ESPRE}}, pages = {19--24}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890523}, doi = {10.1109/ESPRE.2014.6890523}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/MartinAY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/MeadM14, author = {Naney R. Mead and Jose Andre Morales}, title = {Using malware analysis to improve security requirements on future systems}, booktitle = {{ESPRE}}, pages = {37--41}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890526}, doi = {10.1109/ESPRE.2014.6890526}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/MeadM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/re/RaschkeZBLSK14, author = {Wolfgang Raschke and Massimiliano Zilli and Philip Baumgartner and Johannes Loinig and Christian Steger and Christian Kreiner}, title = {Supporting evolving security models for an agile security evaluation}, booktitle = {{ESPRE}}, pages = {31--36}, year = {2014}, url = {https://doi.org/10.1109/ESPRE.2014.6890525}, doi = {10.1109/ESPRE.2014.6890525}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/re/RaschkeZBLSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/re/2014espre, editor = {Kristian Beckers and Shamal Faily and Seok{-}Won Lee and Nancy R. Mead}, title = {{IEEE} 1st Workshop on Evolving Security and Privacy Requirements Engineering, {ESPRE} 2014, 25 August, 2014, Karlskrona, Sweden}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/6883269/proceeding}, isbn = {978-1-4799-6340-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/re/2014espre.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.