dblp.uni-trier.dewww.uni-trier.de

Joshua J. Pauli

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
12 Patrick Henry Engebretson, Joshua J. Pauli, Kevin Streff: An Ethical Network Hacking Contest for Undergraduate Student Recruitment. FECS 2008: 68-74
11EEJoshua J. Pauli, Patrick Henry Engebretson: Hierarchy-Driven Approach for Attack Patterns in Software Security Education. ITNG 2008: 1156-1157
10EEJoshua J. Pauli, Patrick Henry Engebretson: Towards a Specification Prototype for Hierarchy-Driven Attack Patterns. ITNG 2008: 1168-1169
9EEJoshua J. Pauli: Incentive-Based Technology Start-Up Program for Undergraduate Students. ITNG 2008: 841-844
8 Patrick Henry Engebretson, Joshua J. Pauli, Kevin Streff: Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary. Security and Management 2008: 245-250
2007
7 Joshua J. Pauli: Leveraging the TABLETPC in systems analysis and design courses. SEDE 2007: 302-307
6 Joshua J. Pauli: Breaking "EXTENDS" relationships for use/misuse/mitigation use case refinement. SEDE 2007: 76-80
2006
5EEJoshua J. Pauli, Dianxiang Xu: Integrating Functional and Security Requirements with Use Case Decomposition. ICECCS 2006: 57-66
4 Joshua J. Pauli, Dianxiang Xu: Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems. SEKE 2006: 392-397
2005
3 Dianxiang Xu, Joshua J. Pauli: Threat-Driven Architectural Design of Secure Information Systems. ICEIS (3) 2005: 136-143
2EEJoshua J. Pauli, Dianxiang Xu: Misuse Case-Based Design and Analysis of Secure Software Architecture. ITCC (2) 2005: 398-403
1 Joshua J. Pauli, Dianxiang Xu: Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study. MSVVEIS 2005: 89-95

Coauthor Index

1Patrick Henry Engebretson [8] [10] [11] [12]
2Kevin Streff [8] [12]
3Dianxiang Xu [1] [2] [3] [4] [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)