Abstract is missing.
- Continuously integrating securityLaurie Williams. 1-2 [doi]
- Software security vulnerabilities: baselining and benchmarkingPete Rotella. 3-10 [doi]
- Risk-based design security analysisLaurens Sion, Koen Yskout, Dimitri Van Landuyt, Wouter Joosen. 11-18 [doi]
- Understanding the relationship between quality and security: a large-scale analysis of Android applicationsAnthony Peruma, Daniel E. Krutz. 19-25 [doi]
- An investigation of security conversations in stack overflow: perceptions of security and community involvementTamara Lopez, Thein Than Tun, Arosha K. Bandara, Mark Levine, Bashar Nuseibeh, Helen Sharp. 26-32 [doi]
- I've seen this before: sharing cyber-physical incident knowledgeFaeq Alrimawi, Liliana Pasquale, Deepak Mehta, Bashar Nuseibeh. 33-40 [doi]
- Safe cryptography for all: towards visual metaphor driven cryptography building blocksDirk van der Linden, Awais Rashid, Emma Williams, Bogdan Warinschi. 41-44 [doi]
- Security patterns 2.0: towards security patterns based on security building blocksAlexander van den Berghe, Koen Yskout, Wouter Joosen. 45-48 [doi]
- DLR secure software engineering: position and vision paperRohan Krishnamurthy, Michael Meinel, Carina Haupt, Andreas Schreiber, Patrick Mäder. 49-50 [doi]
- Providing an experiential cybersecurity learning experience through mobile security labsAnthony Peruma, Samuel A. Malachowsky, Daniel E. Krutz. 51-54 [doi]