2008 |
12 | | Patrick Henry Engebretson,
Joshua J. Pauli,
Kevin Streff:
An Ethical Network Hacking Contest for Undergraduate Student Recruitment.
FECS 2008: 68-74 |
11 | EE | Joshua J. Pauli,
Patrick Henry Engebretson:
Hierarchy-Driven Approach for Attack Patterns in Software Security Education.
ITNG 2008: 1156-1157 |
10 | EE | Joshua J. Pauli,
Patrick Henry Engebretson:
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns.
ITNG 2008: 1168-1169 |
9 | EE | Joshua J. Pauli:
Incentive-Based Technology Start-Up Program for Undergraduate Students.
ITNG 2008: 841-844 |
8 | | Patrick Henry Engebretson,
Joshua J. Pauli,
Kevin Streff:
Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary.
Security and Management 2008: 245-250 |
2007 |
7 | | Joshua J. Pauli:
Leveraging the TABLETPC in systems analysis and design courses.
SEDE 2007: 302-307 |
6 | | Joshua J. Pauli:
Breaking "EXTENDS" relationships for use/misuse/mitigation use case refinement.
SEDE 2007: 76-80 |
2006 |
5 | EE | Joshua J. Pauli,
Dianxiang Xu:
Integrating Functional and Security Requirements with Use Case Decomposition.
ICECCS 2006: 57-66 |
4 | | Joshua J. Pauli,
Dianxiang Xu:
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems.
SEKE 2006: 392-397 |
2005 |
3 | | Dianxiang Xu,
Joshua J. Pauli:
Threat-Driven Architectural Design of Secure Information Systems.
ICEIS (3) 2005: 136-143 |
2 | EE | Joshua J. Pauli,
Dianxiang Xu:
Misuse Case-Based Design and Analysis of Secure Software Architecture.
ITCC (2) 2005: 398-403 |
1 | | Joshua J. Pauli,
Dianxiang Xu:
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study.
MSVVEIS 2005: 89-95 |