Skip to main content
Kent Academic Repository

Browse by Person (creator, editor, contributor, etc.)

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | Date | No Grouping
Number of items: 5.

Conference or workshop item

Guo, Hui and Kafal?, Özgür and Jeukeng, Anne-Liz and Williams, Laurie and Singh, Munindar P. (2018) Poster: Extraction of Security Requirements from Textual Artifacts. In: Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS). (Unpublished) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Jones, Jasmine and Petruso, Megan and Williams, Laurie and Singh, Munindar P. (2017) How Good is a Security Policy against Real Breaches? A HIPAA Case Study. In: 2017 IEEE/ACM 39th International Conference on Software Engineering. pp. 530-540. ISBN 978-1-5386-3868-2. (doi:https://doi.org/10.1109/ICSE.2017.55) (Full text available)
[img]
Preview

Burcham, Morgan and Al-Zyoud, Mahran and Carver, Jeffrey C. and Alsaleh, Mohammed and Du, Hongying and Gilani, Fida and Jiang, Jun and Rahman, Akond and Kafal?, Özgür and Al-Shaer, Ehab and Williams, Laurie (2017) Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp. ACM pp. 13-23. ISBN 978-1-4503-5274-1. (doi:https://doi.org/10.1145/3055305.3055307) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

Kafal?, Özgür and Singh, Munindar P. and Williams, Laurie (2016) Nane: Identifying misuse cases using temporal norm enactments. In: Proceedings: 2016 IEEE 24th International Requirements Engineering Conference. pp. 136-145. ISBN 978-1-5090-4121-3. (doi:https://doi.org/10.1109/RE.2016.34) (Full text available)
[img]
Preview

Kafal?, Özgür and Singh, Munindar P. and Williams, Laurie (2016) Toward a normative approach for forensicability: Extended Abstract. In: Proceedings of the Symposium and Bootcamp on the Science of Security. ACM pp. 65-67. ISBN 978-1-4503-4277-3. (doi:https://doi.org/10.1145/2898375.2898386) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided)

This list was generated on Sat Apr 27 21:18:52 2019 BST.