Economics at your fingertips  

International Journal of Secure Software Engineering (IJSSE)

2010 - 2016

Current editor(s): Khaled M. Khan

From IGI Global
Series data maintained by Journal Editor ().

Access Statistics for this journal.
Track citations for all items by RSS feed
Is something missing from the series or not right? See the RePEc data check for the archive and series.

Volume 7, issue 4, 2016

Survey of Vulnerabilities and Mitigation Techniques for Mooc-Based Applications pp. 1-18 Downloads
Hossain Shahriar, Hisham M. Haddad, David Lebron and Rubana Lupu
Vulnerability Discovery Modeling for Open and Closed Source Software pp. 19-38 Downloads
Ruchi Sharma, Ritu Sibal and A.K. Shrivastava
Where to Integrate Security Practices on DevOps Platform pp. 39-50 Downloads
Hasan Yasar and Kiriakos Kontostathis

Volume 7, issue 3, 2016

Towards Ontological Approach to Security Risk Analysis of Information System: Model and Architecture pp. 1-25 Downloads
Oluwasefunmi ‘Tale Arogundade, Olusola Adeniran, Zhi Jin and Yang Xiaoguang
An Exploratory Study of the Security Design Pattern Landscape and their Classification pp. 26-43 Downloads
Poonam Ponde and Shailaja Shirwaikar
Migration Goals and Risk Management in Cloud Computing: A Review of State of the Art and Survey Results on Practitioners pp. 44-73 Downloads
Shareeful Islam, Stefan Fenz, Edgar Weippl and Christos Kalloniatis

Volume 7, issue 2, 2016

Fuzzy Rule-Based Vulnerability Assessment Framework for Web Applications pp. 1-18 Downloads
Hossain Shahriar and Hisham Haddad
The Case for Privacy Awareness Requirements pp. 19-36 Downloads
Inah Omoronyia
An Incremental B-Model for RBAC-Controlled Electronic Marking System pp. 37-64 Downloads
Nasser Al-hadhrami, Benjamin Aziz and Lotfi ben Othmane

Volume 7, issue 1, 2016

Agile Threat Assessment and Mitigation: An Approach for Method Selection and Tailoring pp. 1-16 Downloads
Clemens Teichmann, Stephan Renatus and Jörn Eichler
Evaluation of the Challenges of Developing Secure Software Using the Agile Approach pp. 17-37 Downloads
Hela Oueslati, Mohammad Masudur Rahman, Lotfi ben Othmane, Imran Ghani and Adila Firdaus Bt Arbain
Steps Towards Fuzz Testing in Agile Test Automation pp. 38-52 Downloads
Pekka Pietikäinen, Atte Kettunen and Juha Röning

Volume 6, issue 4, 2015

Supporting Consistency during the Development and Evolution of Quality Unified Use-Misuse Case Models pp. 1-31 Downloads
Mohamed El-Attar
Expansion and Practical Implementation of the MFC Cybersecurity Model via a Novel Security Requirements Taxonomy pp. 32-51 Downloads
Neila Rjaibi and Latifa Ben Arfa Rabai
An Introduction to Remote Installation Vulnerability in Content Management Systems pp. 52-63 Downloads
Mehdi Dadkhah and Shahaboddin Shamshirband

Volume 6, issue 3, 2015

Request and Response Analysis Framework for Mitigating Clickjacking Attacks pp. 1-25 Downloads
Hossain Shahriar, Hisham Haddad and Vamshee Krishna Devendran
Method Using Command Abstraction Library for Iterative Testing Security of Web Applications pp. 26-49 Downloads
Seiji Munetoh and Nobukazu Yoshioka
An Alternative Threat Model-based Approach for Security Testing pp. 50-64 Downloads
Bouchaib Falah, Mohammed Akour and Samia Oukemeni

Volume 6, issue 2, 2015

An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels pp. 1-22 Downloads
Richard Gay, Heiko Mantel and Henning Sudbrock
Calculating Quantitative Integrity and Secrecy for Imperative Programs pp. 23-46 Downloads
Tom Chothia, Chris Novakovic and Rajiv Ranjan Singh
Using Attack Graphs to Analyze Social Engineering Threats pp. 47-69 Downloads
Kristian Beckers, Leanid Krautsevich and Artsiom Yautsiukhin
Risk-Based Privacy-Aware Information Disclosure pp. 70-89 Downloads
Alessandro Armando, Michele Bezzi, Nadia Metoui and Antonino Sabetta
Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies pp. 90-112 Downloads
Gencer Erdogan, Fredrik Seehusen, Ketil Stølen, Jon Hofstad and Jan Øyvind Aagedal

Volume 6, issue 1, 2015

A Method and Case Study for Using Malware Analysis to Improve Security Requirements pp. 1-23 Downloads
Nancy R. Mead, Jose Andre Morales and Gregory Paul Alice
A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems pp. 24-46 Downloads
Azadeh Alebrahim, Denis Hatebur, Stephan Fassbender, Ludger Goeke and Isabelle Côté
Balancing Product and Process Assurance for Evolving Security Systems pp. 47-75 Downloads
Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger and Christian Kreiner

Volume 5, issue 4, 2014

Validating Security Design Pattern Applications by Testing Design Models pp. 1-30 Downloads
Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takano Okubo and Yoshiaki Fukazawa
A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes pp. 31-47 Downloads
Annette Tetmeyer, Daniel Hein and Hossein Saiedian
Evolution of Security Engineering Artifacts: A State of the Art Survey pp. 48-98 Downloads
Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug and Ruth Breu

Volume 5, issue 3, 2014

Information Theoretic XSS Attack Detection in Web Applications pp. 1-15 Downloads
Hossain Shahriar, Sarah North, Wei-Chuen Chen and Edward Mawangi
Design Churn as Predictor of Vulnerabilities? pp. 16-31 Downloads
Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff and Wouter Joosen
Secure Software Development Assimilation: Effects of External Pressures and Roles of Internal Factors pp. 32-55 Downloads
Mingqiu Song, Donghao Chen and Elizabeth Sylvester Mkoba
Meta-Modeling Based Secure Software Development Processes pp. 56-74 Downloads
Mehrez Essafi and Henda Ben Ghezala

Volume 5, issue 2, 2014

Threat Analysis in Goal-Oriented Security Requirements Modelling pp. 1-19 Downloads
Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz and Paolo Giorgini
A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain pp. 20-43 Downloads
Kristian Beckers, Isabelle Côté, Ludger Goeke, Selim Güler and Maritta Heisel
Automated Synthesis and Ranking of Secure BPMN Orchestrators pp. 44-64 Downloads
Vincenzo Ciancia, Jose Martin, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi and Ernesto Pimentel

Volume 5, issue 1, 2014

Validation of a Trust Approach in Multi-Organization Environments pp. 1-18 Downloads
Khalifa Toumi, Ana Cavalli and César Andrés
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications pp. 19-38 Downloads
Romaric Ludinard, Éric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Éric Alata, Rim Akrout and Yann Bachy
Remote E-Voting Using the Smart Card Web Server pp. 39-60 Downloads
Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes and Konstantinos Markantonakis
Improving the Detection of On-Line Vertical Port Scan in IP Traffic pp. 61-74 Downloads
Christine Fricker, Philippe Robert and Yousra Chabchoub

Volume 4, issue 4, 2013

Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms pp. 1-24 Downloads
Pal-Stefan Murvay and Bogdan Groza
Optimal Voting Strategy against Random and Targeted Attacks pp. 25-46 Downloads
Li Wang, Zheng Li, Shangping Ren and Kevin Kwiat
Trust Based Interdependency Weighting for On-Line Risk Monitoring in Interdependent Critical Infrastructures pp. 47-69 Downloads
Filipe Caldeira, Thomas Schaberreiter, Sébastien Varrette, Edmundo Monteiro, Paulo Simões, Pascal Bouvry and Djamel Khadraoui

Volume 4, issue 3, 2013

Assessing the Value of Formal Control Mechanisms on Strong Password Selection pp. 1-17 Downloads
Jeff Crawford
Semi-Automatic Annotation of Natural Language Vulnerability Reports pp. 18-41 Downloads
Yan Wu, Robin Gandhi and Harvey Siy
Eliciting Security Requirements for an Information System using Asset Flows and Processor Deployment pp. 42-63 Downloads
Haruhiko Kaiya, Junya Sakai, Shinpei Ogata and Kenji Kaijiri
Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study pp. 64-81 Downloads
Neila Rjaibi, Latifa Ben Arfa Rabai, Anis Ben Aissa and Ali Mili

Volume 4, issue 2, 2013

Threat Representation Methods for Composite Service Process Models pp. 1-18 Downloads
Per Håkon Meland and Erlend Andreas Gjære
Mitigating Type Confusion on Java Card pp. 19-39 Downloads
Jean Dubreuil, Guillaume Bouffard, Bhagyalekshmy N. Thampi and Jean-Louis Lanet
A Taxonomy Built on Layers of Abstraction for Time and State Vulnerabilities pp. 40-66 Downloads
Horia V. Corcalciuc

Volume 4, issue 1, 2013

Principles and Measurement Models for Software Assurance pp. 1-10 Downloads
Nancy R. Mead, Dan Shoemaker and Carol Woody
Towards a More Systematic Approach to Secure Systems Design and Analysis pp. 11-30 Downloads
Simon Miller, Susan Appleby, Jonathan M. Garibaldi and Uwe Aickelin
A New Method for Writing Assurance Cases pp. 31-49 Downloads
Yutaka Matsuno and Shuichiro Yamamoto
Analyzing Human Factors for an Effective Information Security Management System pp. 50-74 Downloads
Reza Alavi, Shareeful Islam, Hamid Jahankhani and Ameer Al-Nemrat
Advancing Cyber Resilience Analysis with Performance-Based Metrics from Infrastructure Assessments pp. 75-96 Downloads
Eric D. Vugrin and Jennifer Turgeon
Page updated 2017-03-04