Robin A. Gandhi

According to our database1, Robin A. Gandhi authored at least 41 papers between 2003 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Correction to: Modular norm models: practical representation and analysis of contractual rights and obligations.
Requir. Eng., 2020

Modular norm models: practical representation and analysis of contractual rights and obligations.
Requir. Eng., 2020

2018
The Hidden Crisis : Developing Smart Big Data pipelines to address Grand Challenges of Bridge Infrastructure health in the United States.
Proceedings of the 15th International Conference on Information Systems for Crisis Response and Management, 2018

Open Data Standards for Open Source Software Risk Management Routines: An Examination of SPDX.
Proceedings of the 2018 ACM Conference on Supporting Groupwork, 2018

2017
Modular Norm Models: A Lightweight Approach for Modeling and Reasoning about Legal Compliance.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
DoSOCS: A System for SPDX 2.0 Document Creation and Storage.
J. Open Source Softw., 2016

Forecasting the Spread of Mosquito-Borne Disease using Publicly Accessible Data: A Case Study in Chikungunya.
Proceedings of the AMIA 2016, 2016

2015
Semantic web representations for reasoning about applicability and satisfiability of federal regulations for information security.
Proceedings of the Eighth IEEE International Workshop on Requirements Engineering and Law, 2015

Authentication Bypass and Remote Escalated I/O Command Attacks.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2014
Gauging the Impact of FISMA on Software Security.
Computer, 2014

2013
Semi-Automatic Annotation of Natural Language Vulnerability Reports.
Int. J. Secur. Softw. Eng., 2013

A social dimensional cyber threat model with formal concept analysis and fact-proposition inference.
Int. J. Inf. Comput. Secur., 2013

Lightweight formal models of software weaknesses.
Proceedings of the 1st FME Workshop on Formal Methods in Software Engineering, 2013

2012
Reverse engineering: <i>is it art?</i>.
Inroads, 2012

A freshman level course on information assurance: can it be done? <i>here's how</i>.
Inroads, 2012

Early security patterns: A collection of constraints to describe regulatory security requirements.
Proceedings of the Second IEEE International Workshop on Requirements Patterns, 2012

2011
Discovering Multidimensional Correlations among Regulatory Requirements to Understand Risk.
ACM Trans. Softw. Eng. Methodol., 2011

Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political.
IEEE Technol. Soc. Mag., 2011

An integrated framework for control system simulation and regulatory compliance monitoring.
Int. J. Crit. Infrastructure Prot., 2011

Empirical results on the study of software vulnerabilities.
Proceedings of the 33rd International Conference on Software Engineering, 2011

Using anomalous event patterns in control systems for tamper detection.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Requirements: Tracing.
Proceedings of the Encyclopedia of Software Engineering, 2010

Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named Entities.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Using Term Extraction Patterns to Discover Coherent Relationships from Open Source Intelligence.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Building a Social Dimensional Threat Model from Current and Historic Events of Cyber Attacks.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Using semantic templates to study vulnerabilities recorded in large software repositories.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010

2009
Ontology Guided Risk Analysis: From Informal Specifications to Formal Metrics.
Proceedings of the Advances in Information and Intelligent Systems, 2009

Ontology-Guided Service-Oriented Architecture Composition to Support Complex and Tailorable Process Definitions.
Int. J. Softw. Eng. Knowl. Eng., 2009

Assurance Case Driven Case Study Design for Requirements Engineering Research.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2009

2007
Certification process artifacts defined as measurable units for software assurance.
Softw. Process. Improv. Pract., 2007

r-AnalytiCA: Requirements Analytics for Certification & Accreditation.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Discovering and Understanding Multi-dimensional Correlations among Certification Requirements with application to Risk Assessment.
Proceedings of the 15th IEEE International Requirements Engineering Conference, 2007

Towards a Requirements-Driven Workbench for Supporting Software Certification and Accreditation.
Proceedings of the Third International Workshop on Software Engineering for Secure Systems, 2007

2006
Building Decision Support Problem Domain Ontology from Natural Language Requirements for Software Assurance.
Int. J. Softw. Eng. Knowl. Eng., 2006

Incorporating Multimedia Source Materials into a Traceability Framework.
Proceedings of the 2006 First International Workshop on Multimedia Requirements Engineering, 2006

Building problem domain ontology from security requirements in regulatory documents.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

2005
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
ACM SIGSOFT Softw. Eng. Notes, 2005

Active Automation of the DITSCAP.
Proceedings of the Intelligence and Security Informatics, 2005

Ontology-based Active Requirements Engineering Framework.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

Common criteria requirements modeling and its uses for quality of information assurance (QoIA).
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2003
Locale-based access control: placing collaborative authorization decisions in context.
Proceedings of the IEEE International Conference on Systems, 2003


  Loading...