A Natural Classification Scheme for Software Security Patterns, IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, pp.113-120, 2011. ,
A Comparative Study of Software Security Pattern Classifications, Seventh International Conference on Availability, Reliability and Security, pp.582-589, 2012. ,
Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns, Ninth International Conference on Availability, Reliability and Security, pp.476-483, 2014. ,
Software Architecture in Practice, 2012. ,
Organizing security patterns related to security and pattern recognition requirements, International Journal on Advances in Security, vol.5, 2012. ,
Controlled experiments with student participants in software engineering: Preliminary results from a systematic mapping study, 2017. ,
Transparent fault tolerance for web services based architectures, Euro-Par 2002 Parallel Processing, pp.889-898, 2002. ,
Security patterns and secure systems design, Dependable Computing, pp.233-234, 2007. ,
Revisiting architectural tactics for security, Software Architecture, pp.55-69, 2015. ,
Using an Ontology to Suggest Software Design Patterns Integration, pp.318-331, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-02042311
Attack trees with sequential conjunction, IFIP International Information Security Conference, pp.339-353, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01197256
ADTool: security analysis with attack-defense trees, International Conference on Quantitative Evaluation of Systems, pp.173-176, 2013. ,
Attack-defense trees, Journal of Logic and Computation, p.29, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01825088
Web application security engineering, Security & Privacy, vol.4, issue.4, pp.16-24, 2006. ,
, Common attack pattern enumeration and classification, 2018.
, Common weakness enumeration, 2018.
,
Exploit database archive, 2018. ,
, Owasp testing guide v3.0 project, OWASP, 2003.
A methodology of security pattern classification and of attack-defense tree generation, Proceedings of the 3nd International Conference on Information Systems Security and Privacy, pp.2-2017, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01715107
Security pattern classification, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01868235
A classification methodology for security patterns to help fix software weaknesses, 13th ACS/IEEE International Conference on Computer Systems and Applications AICCSA, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02019271
A systematic approach to assist designers in security pattern integration, The Second International Conference on Advances and Trends in Software Engineering (SOFTENG 2016), 2016. ,
Security Design Patterns, 19th Annual Computer Security Application Conference (ACSAC'03), 2003. ,
The protection of information in computer systems, Proceedings of the IEEE, vol.63, issue.9, pp.1278-1308, 1975. ,
Improving Web Application Security, 2003. ,
Security Engineering with Patterns: Origins, Theoretical Models, and New Applications, 2003. ,
, , 2017.
Introduction to Data Mining, 2005. ,
Combining misuse cases with attack trees and security activity models, Availability, Reliability, and Security, 2010. ARES'10 International Conference on, pp.438-445, 2010. ,
An extensible pattern-based library and taxonomy of security threats for distributed systems, Computer Standards & Interfaces, vol.36, issue.4, pp.734-747, 2014. ,
Building Secure Software: How to Avoid Security Problems the Right Way, Portable Documents. Pearson Education, 2001. ,
Security patterns, Michigan State University, PLoP Conf. Citeseer, 2003. ,
A security design pattern taxonomy based on attack patterns, International Joint Conference on e-Business and Telecommunications, pp.387-394, 2009. ,
Recent trends in hierarchic document clustering: a critical review, Information Processing & Management, vol.24, issue.5, pp.577-597, 1988. ,
Architectural patterns for enabling application security, Proceedings of PLoP, vol.51, p.31, 1997. ,
A system of security patterns, 2006. ,
Do security patterns really help designers?, Proceedings of the 37th International Conference on Software Engineering, vol.1, pp.292-302, 2015. ,