Joshua J. Pauli
According to our database1,
Joshua J. Pauli
authored at least 19 papers
between 2005 and 2013.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2013
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
2012
2011
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011
Work in progress - Web penetration testing: Effectiveness of student learning in Web application security.
Proceedings of the 2011 Frontiers in Education Conference, 2011
2010
A Cradle-to-Grave Approach to Retaining Students in Information Security Programs.
Proceedings of the 2010 International Conference on Security & Management, 2010
Lessons Learned from an Evolving Information Assurance Lab.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008
An Ethical Network Hacking Contest for Undergraduate Student Recruitment.
Proceedings of the 2008 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2008
Abstracting Parent Mitigations from the CAPEC Attack Pattern Dictionary.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Leveraging the TABLETPC in systems analysis and design courses.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007
Breaking "EXTENDS" relationships for use/misuse/mitigation use case refinement.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007
2006
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems.
Proceedings of the Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), 2006
Proceedings of the 11th International Conference on Engineering of Complex Computer Systems (ICECCS 2006), 2006
2005
Trade-off Analysis of Misuse Case-based Secure Software Architectures: A Case Study.
Proceedings of the Modelling, 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Threat-Driven Architectural Design of Secure Information Systems.
Proceedings of the ICEIS 2005, 2005