Journal: IJSSE

Volume 6, Issue 4

1 -- 31Mohamed El-Attar. Supporting Consistency during the Development and Evolution of Quality Unified Use-Misuse Case Models
32 -- 51Neila Rjaibi, Latifa Ben Arfa Rabai. Expansion and Practical Implementation of the MFC Cybersecurity Model via a Novel Security Requirements Taxonomy
52 -- 63Mehdi Dadkhah, Shahaboddin Shamshirband. An Introduction to Remote Installation Vulnerability in Content Management Systems

Volume 6, Issue 3

1 -- 25Hossain Shahriar, Hisham M. Haddad, Vamshee Krishna Devendran. Request and Response Analysis Framework for Mitigating Clickjacking Attacks
26 -- 49Seiji Munetoh, Nobukazu Yoshioka. Method Using Command Abstraction Library for Iterative Testing Security of Web Applications
50 -- 64Bouchaib Falah, Mohammed Akour, Samia Oukemeni. An Alternative Threat Model-based Approach for Security Testing

Volume 6, Issue 2

1 -- 22Richard Gay, Heiko Mantel, Henning Sudbrock. An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels
23 -- 46Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh. Calculating Quantitative Integrity and Secrecy for Imperative Programs
47 -- 69Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin. Using Attack Graphs to Analyze Social Engineering Threats
70 -- 89Alessandro Armando, Michele Bezzi, Nadia Metoui, Antonino Sabetta. Risk-Based Privacy-Aware Information Disclosure
90 -- 112Gencer Erdogan, Fredrik Seehusen, Ketil Stølen, Jon Hofstad, Jan Øyvind Aagedal. Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies

Volume 6, Issue 1

1 -- 23Nancy R. Mead, Jose Andre Morales, Gregory Paul Alice. A Method and Case Study for Using Malware Analysis to Improve Security Requirements
24 -- 46Azadeh Alebrahim, Denis Hatebur, Stephan Faßbender, Ludger Goeke, Isabelle Côté. A Pattern-Based and Tool-Supported Risk Analysis Method Compliant to ISO 27001 for Cloud Systems
47 -- 75Wolfgang Raschke, Massimiliano Zilli, Philip Baumgartner, Johannes Loinig, Christian Steger, Christian Kreiner. Balancing Product and Process Assurance for Evolving Security Systems