| 2008 |
| 12 | | Patrick Henry Engebretson,
Joshua J. Pauli,
Kevin Streff:
An Ethical Network Hacking Contest for Undergraduate Student Recruitment.
FECS 2008: 68-74 |
| 11 | EE | Joshua J. Pauli,
Patrick Henry Engebretson:
Hierarchy-Driven Approach for Attack Patterns in Software Security Education.
ITNG 2008: 1156-1157 |
| 10 | EE | Joshua J. Pauli,
Patrick Henry Engebretson:
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns.
ITNG 2008: 1168-1169 |
| 9 | EE | Joshua J. Pauli:
Incentive-Based Technology Start-Up Program for Undergraduate Students.
ITNG 2008: 841-844 |
| 8 | | Patrick Henry Engebretson,
Joshua J. Pauli,
Kevin Streff:
Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary.
Security and Management 2008: 245-250 |
| 2007 |
| 7 | | Joshua J. Pauli:
Leveraging the TABLETPC in systems analysis and design courses.
SEDE 2007: 302-307 |
| 6 | | Joshua J. Pauli:
Breaking "EXTENDS" relationships for use/misuse/mitigation use case refinement.
SEDE 2007: 76-80 |
| 2006 |
| 5 | EE | Joshua J. Pauli,
Dianxiang Xu:
Integrating Functional and Security Requirements with Use Case Decomposition.
ICECCS 2006: 57-66 |
| 4 | | Joshua J. Pauli,
Dianxiang Xu:
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems.
SEKE 2006: 392-397 |
| 2005 |
| 3 | | Dianxiang Xu,
Joshua J. Pauli:
Threat-Driven Architectural Design of Secure Information Systems.
ICEIS (3) 2005: 136-143 |
| 2 | EE | Joshua J. Pauli,
Dianxiang Xu:
Misuse Case-Based Design and Analysis of Secure Software Architecture.
ITCC (2) 2005: 398-403 |
| 1 | | Joshua J. Pauli,
Dianxiang Xu:
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study.
MSVVEIS 2005: 89-95 |