Joshua J. Pauli

According to our database1, Joshua J. Pauli authored at least 19 papers between 2005 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Improving the Efficiency and Effectiveness of Penetration Test Automation.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

2012
Filling Your Cyber Operations Training Toolbox.
IEEE Secur. Priv., 2012

2011
CookieMonster: Automated Session Hijacking Archival and Analysis.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Work in progress - Web penetration testing: Effectiveness of student learning in Web application security.
Proceedings of the 2011 Frontiers in Education Conference, 2011

2010
A Cradle-to-Grave Approach to Retaining Students in Information Security Programs.
Proceedings of the 2010 International Conference on Security & Management, 2010

Lessons Learned from an Evolving Information Assurance Lab.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Leveraging Parent Mitigations and Threats for CAPEC-Driven Hierarchies.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Hierarchy-Driven Approach for Attack Patterns in Software Security Education.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Incentive-Based Technology Start-Up Program for Undergraduate Students.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

An Ethical Network Hacking Contest for Undergraduate Student Recruitment.
Proceedings of the 2008 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2008

Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Leveraging the TABLETPC in systems analysis and design courses.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007

Breaking "EXTENDS" relationships for use/misuse/mitigation use case refinement.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007

2006
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006

Integrating Functional and Security Requirements with Use Case Decomposition.
Proceedings of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), 2006

2005
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study.
Proceedings of the Modelling, 2005

Misuse Case-Based Design and Analysis of Secure Software Architecture.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Threat-Driven Architectural Design of Secure Information Systems.
Proceedings of the ICEIS 2005, 2005


  Loading...