关注
Robin Gandhi
标题
引用次数
引用次数
年份
Dimensions of cyber-attacks: Cultural, social, economic, and political
R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 30 (1), 28-38, 2011
2332011
Ontology-based active requirements engineering framework
SW Lee, RA Gandhi
12th Asia-Pacific Software Engineering Conference (APSEC'05), 8 pp., 2005
1072005
Building problem domain ontology from security requirements in regulatory documents
SW Lee, R Gandhi, D Muthurajan, D Yavagal, GJ Ahn
Proceedings of the 2006 international workshop on Software engineering for …, 2006
832006
Requirements engineering visualization: a survey on the state-of-the-art
JR Cooper, SW Lee, RA Gandhi, O Gotel
2009 Fourth International Workshop on Requirements Engineering Visualization …, 2009
672009
Building decision support problem domain ontology from natural language requirements for software assurance
SW Lee, D Muthurajan, RA Gandhi, D Yavagal, GJ Ahn
International Journal of Software Engineering and Knowledge Engineering 16 …, 2006
432006
Using semantic templates to study vulnerabilities recorded in large software repositories
Y Wu, RA Gandhi, H Siy
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
402010
Social, Political, Economic, and Cultural
R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 1932 (4529/11), 2011
372011
An integrated framework for control system simulation and regulatory compliance monitoring
W Mahoney, RA Gandhi
International Journal of Critical Infrastructure Protection 4 (1), 41-53, 2011
302011
Visual analytics for requirements-driven risk assessment
RA Gandhi, SW Lee
Second International Workshop on Requirements Engineering Visualization (REV …, 2007
272007
Certification process artifacts defined as measurable units for software assurance
SW Lee, RA Gandhi, GJ Ahn
Software Process: Improvement and Practice 12 (2), 165-189, 2007
242007
Common criteria requirements modeling and its uses for quality of information assurance (QoIA)
DS Yavagal, SW Lee, GJ Ahn, RA Gandhi
Proceedings of the 43rd annual Southeast regional conference-Volume 2, 130-135, 2005
242005
Authentication bypass and remote escalated I/O command attacks
R Grandgenett, W Mahoney, R Gandhi
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
212015
Building a social dimensional threat model from current and historic events of cyber attacks
AC Sharma, RA Gandhi, W Mahoney, W Sousan, Q Zhu
2010 IEEE Second International Conference on Social Computing, 981-986, 2010
212010
Towards a requirements-driven workbench for supporting software certification and accreditation
SW Lee, RA Gandhi, S Wagle
Third International Workshop on Software Engineering for Secure Systems …, 2007
212007
Discovering multidimensional correlations among regulatory requirements to understand risk
RA Gandhi, SW Lee
ACM Transactions on Software Engineering and Methodology (TOSEM) 20 (4), 1-37, 2011
202011
Security requirements driven risk assessment for critical infrastructure information systems
SW Lee, RA Gandhi, G Ahn
Proceedings of the Symposium on Requirements Engineering for Information …, 2005
202005
Empirical results on the study of software vulnerabilities (NIER track)
Y Wu, H Siy, R Gandhi
Proceedings of the 33rd International Conference on Software Engineering …, 2011
182011
Discovering and understanding multi-dimensional correlations among certification requirements with application to risk assessment
RA Gandhi, SW Lee
15th IEEE International Requirements Engineering Conference (RE 2007), 231-240, 2007
182007
Open data standards for open source software risk management routines: An examination of SPDX
R Gandhi, M Germonprez, GJP Link
Proceedings of the 2018 ACM International Conference on Supporting Group …, 2018
162018
Risk prioritization and management
KM Crosby, RA Gandhi, H Siy
US Patent 9,525,698, 2016
162016
系统目前无法执行此操作,请稍后再试。
文章 1–20