Dimensions of cyber-attacks: Cultural, social, economic, and political R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante IEEE Technology and Society Magazine 30 (1), 28-38, 2011 | 233 | 2011 |
Ontology-based active requirements engineering framework SW Lee, RA Gandhi 12th Asia-Pacific Software Engineering Conference (APSEC'05), 8 pp., 2005 | 107 | 2005 |
Building problem domain ontology from security requirements in regulatory documents SW Lee, R Gandhi, D Muthurajan, D Yavagal, GJ Ahn Proceedings of the 2006 international workshop on Software engineering for …, 2006 | 83 | 2006 |
Requirements engineering visualization: a survey on the state-of-the-art JR Cooper, SW Lee, RA Gandhi, O Gotel 2009 Fourth International Workshop on Requirements Engineering Visualization …, 2009 | 67 | 2009 |
Building decision support problem domain ontology from natural language requirements for software assurance SW Lee, D Muthurajan, RA Gandhi, D Yavagal, GJ Ahn International Journal of Software Engineering and Knowledge Engineering 16 …, 2006 | 43 | 2006 |
Using semantic templates to study vulnerabilities recorded in large software repositories Y Wu, RA Gandhi, H Siy Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010 | 40 | 2010 |
Social, Political, Economic, and Cultural R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante IEEE Technology and Society Magazine 1932 (4529/11), 2011 | 37 | 2011 |
An integrated framework for control system simulation and regulatory compliance monitoring W Mahoney, RA Gandhi International Journal of Critical Infrastructure Protection 4 (1), 41-53, 2011 | 30 | 2011 |
Visual analytics for requirements-driven risk assessment RA Gandhi, SW Lee Second International Workshop on Requirements Engineering Visualization (REV …, 2007 | 27 | 2007 |
Certification process artifacts defined as measurable units for software assurance SW Lee, RA Gandhi, GJ Ahn Software Process: Improvement and Practice 12 (2), 165-189, 2007 | 24 | 2007 |
Common criteria requirements modeling and its uses for quality of information assurance (QoIA) DS Yavagal, SW Lee, GJ Ahn, RA Gandhi Proceedings of the 43rd annual Southeast regional conference-Volume 2, 130-135, 2005 | 24 | 2005 |
Authentication bypass and remote escalated I/O command attacks R Grandgenett, W Mahoney, R Gandhi Proceedings of the 10th Annual Cyber and Information Security Research …, 2015 | 21 | 2015 |
Building a social dimensional threat model from current and historic events of cyber attacks AC Sharma, RA Gandhi, W Mahoney, W Sousan, Q Zhu 2010 IEEE Second International Conference on Social Computing, 981-986, 2010 | 21 | 2010 |
Towards a requirements-driven workbench for supporting software certification and accreditation SW Lee, RA Gandhi, S Wagle Third International Workshop on Software Engineering for Secure Systems …, 2007 | 21 | 2007 |
Discovering multidimensional correlations among regulatory requirements to understand risk RA Gandhi, SW Lee ACM Transactions on Software Engineering and Methodology (TOSEM) 20 (4), 1-37, 2011 | 20 | 2011 |
Security requirements driven risk assessment for critical infrastructure information systems SW Lee, RA Gandhi, G Ahn Proceedings of the Symposium on Requirements Engineering for Information …, 2005 | 20 | 2005 |
Empirical results on the study of software vulnerabilities (NIER track) Y Wu, H Siy, R Gandhi Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 18 | 2011 |
Discovering and understanding multi-dimensional correlations among certification requirements with application to risk assessment RA Gandhi, SW Lee 15th IEEE International Requirements Engineering Conference (RE 2007), 231-240, 2007 | 18 | 2007 |
Open data standards for open source software risk management routines: An examination of SPDX R Gandhi, M Germonprez, GJP Link Proceedings of the 2018 ACM International Conference on Supporting Group …, 2018 | 16 | 2018 |
Risk prioritization and management KM Crosby, RA Gandhi, H Siy US Patent 9,525,698, 2016 | 16 | 2016 |