Search results

(1 - 5 of 5)
Label
Concept mapping for the efficient generation and communication of security assurance cases
Coffey, J., Snider, D., Reichherzer, T., & Wilde, N. (2014). Concept mapping for the efficient generation and communication of security assurance cases. Fifth International Multi-Conference on Complexity, Informatics and Cybernetics (IMCIC 2014).
Using concept maps to introduce software security assurance cases
Snider, D., Coffey, J., Reichherzer, T., Wilde, N., Terry, C., Vandeville, J., Heinen, A., & Pramanik, S. (2014). Using concept maps to introduce software security assurance cases. CrossTalk: The Journal of Defense Software Engineering, 27(5), 4-9.
Knowledge elicitation and conceptual modeling to foster security and trust in SOA system evolution
Coffey, J. W., Baskin, A., & Snider, D. Knowledge elicitation and conceptual modeling to foster security and trust in SOA system evolution. Emerging Trends in The Evolution of Service-Oriented and Enterprise Architectures, 41-58.
A knowledge-based system approach for extracting abstractions from service oriented architecture artifacts
Goehring, G., Reichherzer, T., El-Sheikh, E., Snider, D., Wilde, N., Bagui, S., Coffey, J., & White, L. J. (2013). A knowledge-based system approach for extracting abstractions from service oriented architecture artifacts. International Journal of Advanced Research in Artificial Intelligence (IJARAI), 2(3), 45-52. doi:10.14569/IJARAI.2013.020307
A knowledge engineering, team-based approach to introducing security assurance cases
Wilde, N., Coffey, J., White, L., Snider, D., Reichherzer, T., El-Sheikh, E., & Gonen, B. (2013). A knowledge engineering, team-based approach to introducing security assurance cases.