25 papers:
- SKY-2014-GoldinG #named
- SPRing: Iterative Overcoming of Software Misuse (LG, RG), pp. 43–51.
- FSE-2014-BaeCLR #api #detection #named #web
- SAFEWAPI: web API misuse detector for web applications (SB, HC, IL, SR), pp. 507–517.
- SKY-2013-GallantG
- Overcoming Software System Misuse by Domain Knowledge (RG, LG), pp. 62–69.
- ICST-2013-LinD #concurrent #java
- CHECK-THEN-ACT Misuse of Java Concurrent Collections (YL, DD), pp. 164–173.
- AdaEurope-2012-ForlerLW #api #design #encryption #library #programming
- Designing the API for a Cryptographic Library — A Misuse-Resistant Application Programming Interface (CF, SL, JW), pp. 75–88.
- ICSE-2012-VakilianCNRBJ #automation #refactoring
- Use, disuse, and misuse of automated refactorings (MV, NC, SN, BAR, BPB, REJ), pp. 233–243.
- HCI-UA-2011-MaehigashiMTKMH #automation #using
- Experimental Investigation of Misuse and Disuse in Using Automation System (AM, KM, HT, KK, JM, YH), pp. 384–393.
- SEKE-2011-HashizumeFY #in the cloud
- Misuse Patterns for Cloud Computing (KH, EBF, NY), pp. 683–686.
- RE-2011-FailyF #elicitation #requirements #security
- Eliciting usable security requirements with misusability cases (SF, IF), pp. 339–340.
- ICEIS-DISI-2010-SunyaevKDK #framework #health
- Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure (AS, AK, SD, HK), pp. 229–235.
- SEKE-2010-El-Attar #analysis #case study #precise #robust #security
- Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
- REFSQ-2010-KarpatiSO #case study #visualisation
- Visualizing Cyber Attacks with Misuse Case Maps (PK, GS, ALO), pp. 262–275.
- ICEIS-AIDSS-2008-BringasPPS
- Bayesian-Networks-Based Misuse and Anomaly Prevention System (PGB, YKP, SP, PS), pp. 62–69.
- ICEIS-J-2008-BringasP
- Next-Generation Misuse and Anomaly Prevention System (PGB, YKP), pp. 117–129.
- MoDELS-2008-StalhaneS #case study #comparison #diagrams #identification #safety
- Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
- MoDELS-2008-StalhaneS #case study #comparison #diagrams #identification #safety
- Safety Hazard Identification by Misuse Cases: Experimental Comparison of Text and Diagrams (TS, GS), pp. 721–735.
- ICSE-2008-WhittleWH #case study #execution #modelling #security
- Executable misuse cases for modeling security concerns (JW, DW, MH), pp. 121–130.
- SEKE-2006-PauliX #case study #composition #consistency
- Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems (JJP, DX), pp. 392–397.
- SAC-2005-MaG #detection #information retrieval #query
- Query length impact on misuse detection in information retrieval systems (LM, NG), pp. 1070–1075.
- CIKM-2004-MaG #detection #feedback #information retrieval #using
- Using relevance feedback to detect misuse for information retrieval systems (LM, NG), pp. 164–165.
- CIKM-2003-CatheyMGG #detection #information retrieval
- Misuse detection for information retrieval systems (RC, LM, NG, DAG), pp. 183–190.
- RE-2002-Alexander #analysis #case study #experience #industrial #trade-off
- Initial Industrial Experience of Misuse Cases in Trade-Off Analysis (IFA), pp. 61–70.
- TOOLS-PACIFIC-2000-SindreO #case study #elicitation #requirements #security
- Eliciting Security Requirements by Misuse Cases (GS, ALO), pp. 120–131.
- TOOLS-EUROPE-1994-Meyer #inheritance #named
- Keynote: Uses and Misuses of Inheritance (BM), p. 9.
- DAC-1969-Dov #research #simulation
- Misuse and limitations of simulation as a business research technique: Some comments (AGBD), pp. 323–331.