BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
case (9)
system (8)
use (5)
secur (5)
inform (4)

Stem misus$ (all stems)

25 papers:

SKYSKY-2014-GoldinG #named
SPRing: Iterative Overcoming of Software Misuse (LG, RG), pp. 43–51.
FSEFSE-2014-BaeCLR #api #detection #named #web
SAFEWAPI: web API misuse detector for web applications (SB, HC, IL, SR), pp. 507–517.
SKYSKY-2013-GallantG
Overcoming Software System Misuse by Domain Knowledge (RG, LG), pp. 62–69.
ICSTICST-2013-LinD #concurrent #java
CHECK-THEN-ACT Misuse of Java Concurrent Collections (YL, DD), pp. 164–173.
AdaEuropeAdaEurope-2012-ForlerLW #api #design #encryption #library #programming
Designing the API for a Cryptographic Library — A Misuse-Resistant Application Programming Interface (CF, SL, JW), pp. 75–88.
ICSEICSE-2012-VakilianCNRBJ #automation #refactoring
Use, disuse, and misuse of automated refactorings (MV, NC, SN, BAR, BPB, REJ), pp. 233–243.
HCIHCI-UA-2011-MaehigashiMTKMH #automation #using
Experimental Investigation of Misuse and Disuse in Using Automation System (AM, KM, HT, KK, JM, YH), pp. 384–393.
SEKESEKE-2011-HashizumeFY #in the cloud
Misuse Patterns for Cloud Computing (KH, EBF, NY), pp. 683–686.
RERE-2011-FailyF #elicitation #requirements #security
Eliciting usable security requirements with misusability cases (SF, IF), pp. 339–340.
ICEISICEIS-DISI-2010-SunyaevKDK #framework #health
Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure (AS, AK, SD, HK), pp. 229–235.
SEKESEKE-2010-El-Attar #analysis #case study #precise #robust #security
Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
REFSQREFSQ-2010-KarpatiSO #case study #visualisation
Visualizing Cyber Attacks with Misuse Case Maps (PK, GS, ALO), pp. 262–275.
ICEISICEIS-AIDSS-2008-BringasPPS
Bayesian-Networks-Based Misuse and Anomaly Prevention System (PGB, YKP, SP, PS), pp. 62–69.
ICEISICEIS-J-2008-BringasP
Next-Generation Misuse and Anomaly Prevention System (PGB, YKP), pp. 117–129.
MODELSMoDELS-2008-StalhaneS #case study #comparison #diagrams #identification #safety
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
MODELSMoDELS-2008-StalhaneS #case study #comparison #diagrams #identification #safety
Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
ICSEICSE-2008-WhittleWH #case study #execution #modelling #security
Executable misuse cases for modeling security concerns (JW, DW, MH), pp. 121–130.
SEKESEKE-2006-PauliX #case study #composition #consistency
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems (JJP, DX), pp. 392–397.
SACSAC-2005-MaG #detection #information retrieval #query
Query length impact on misuse detection in information retrieval systems (LM, NG), pp. 1070–1075.
CIKMCIKM-2004-MaG #detection #feedback #information retrieval #using
Using relevance feedback to detect misuse for information retrieval systems (LM, NG), pp. 164–165.
CIKMCIKM-2003-CatheyMGG #detection #information retrieval
Misuse detection for information retrieval systems (RC, LM, NG, DAG), pp. 183–190.
RERE-2002-Alexander #analysis #case study #experience #industrial #trade-off
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis (IFA), pp. 61–70.
TOOLSTOOLS-PACIFIC-2000-SindreO #case study #elicitation #requirements #security
Eliciting Security Requirements by Misuse Cases (GS, ALO), pp. 120–131.
TOOLSTOOLS-EUROPE-1994-Meyer #inheritance #named
Keynote: Uses and Misuses of Inheritance (BM), p. 9.
DACDAC-1969-Dov #research #simulation
Misuse and limitations of simulation as a business research technique: Some comments (AGBD), pp. 323–331.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.