25 papers:
SKY-2014-GoldinG #named- SPRing: Iterative Overcoming of Software Misuse (LG, RG), pp. 43–51.
FSE-2014-BaeCLR #api #detection #named #web- SAFEWAPI: web API misuse detector for web applications (SB, HC, IL, SR), pp. 507–517.
SKY-2013-GallantG- Overcoming Software System Misuse by Domain Knowledge (RG, LG), pp. 62–69.
ICST-2013-LinD #concurrent #java- CHECK-THEN-ACT Misuse of Java Concurrent Collections (YL, DD), pp. 164–173.
AdaEurope-2012-ForlerLW #api #design #encryption #library #programming- Designing the API for a Cryptographic Library — A Misuse-Resistant Application Programming Interface (CF, SL, JW), pp. 75–88.
ICSE-2012-VakilianCNRBJ #automation #refactoring- Use, disuse, and misuse of automated refactorings (MV, NC, SN, BAR, BPB, REJ), pp. 233–243.
HCI-UA-2011-MaehigashiMTKMH #automation #using- Experimental Investigation of Misuse and Disuse in Using Automation System (AM, KM, HT, KK, JM, YH), pp. 384–393.
SEKE-2011-HashizumeFY #in the cloud- Misuse Patterns for Cloud Computing (KH, EBF, NY), pp. 683–686.
RE-2011-FailyF #elicitation #requirements #security- Eliciting usable security requirements with misusability cases (SF, IF), pp. 339–340.
ICEIS-DISI-2010-SunyaevKDK #framework #health- Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure (AS, AK, SD, HK), pp. 229–235.
SEKE-2010-El-Attar #analysis #case study #precise #robust #security- Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
REFSQ-2010-KarpatiSO #case study #visualisation- Visualizing Cyber Attacks with Misuse Case Maps (PK, GS, ALO), pp. 262–275.
ICEIS-AIDSS-2008-BringasPPS- Bayesian-Networks-Based Misuse and Anomaly Prevention System (PGB, YKP, SP, PS), pp. 62–69.
ICEIS-J-2008-BringasP- Next-Generation Misuse and Anomaly Prevention System (PGB, YKP), pp. 117–129.
MoDELS-2008-StalhaneS #case study #comparison #diagrams #identification #safety- Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
MoDELS-2008-StalhaneS #case study #comparison #diagrams #identification #safety- Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
ICSE-2008-WhittleWH #case study #execution #modelling #security- Executable misuse cases for modeling security concerns (JW, DW, MH), pp. 121–130.
SEKE-2006-PauliX #case study #composition #consistency- Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems (JJP, DX), pp. 392–397.
SAC-2005-MaG #detection #information retrieval #query- Query length impact on misuse detection in information retrieval systems (LM, NG), pp. 1070–1075.
CIKM-2004-MaG #detection #feedback #information retrieval #using- Using relevance feedback to detect misuse for information retrieval systems (LM, NG), pp. 164–165.
CIKM-2003-CatheyMGG #detection #information retrieval- Misuse detection for information retrieval systems (RC, LM, NG, DAG), pp. 183–190.
RE-2002-Alexander #analysis #case study #experience #industrial #trade-off- Initial Industrial Experience of Misuse Cases in Trade-Off Analysis (IFA), pp. 61–70.
TOOLS-PACIFIC-2000-SindreO #case study #elicitation #requirements #security- Eliciting Security Requirements by Misuse Cases (GS, ALO), pp. 120–131.
TOOLS-EUROPE-1994-Meyer #inheritance #named- Keynote: Uses and Misuses of Inheritance (BM), p. 9.
DAC-1969-Dov #research #simulation- Misuse and limitations of simulation as a business research technique: Some comments (AGBD), pp. 323–331.