Dimensions of cyber-attacks: Cultural, social, economic, and political R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 30 (1), 28-38, 2011
244 2011 Ontology-based active requirements engineering framework SW Lee, RA Gandhi
12th Asia-Pacific Software Engineering Conference (APSEC'05), 8 pp., 2005
108 2005 Building problem domain ontology from security requirements in regulatory documents SW Lee, R Gandhi, D Muthurajan, D Yavagal, GJ Ahn
Proceedings of the 2006 international workshop on Software engineering for …, 2006
85 2006 Requirements engineering visualization: a survey on the state-of-the-art JR Cooper, SW Lee, RA Gandhi, O Gotel
2009 Fourth International Workshop on Requirements Engineering Visualization …, 2009
69 2009 Building decision support problem domain ontology from natural language requirements for software assurance SW Lee, D Muthurajan, RA Gandhi, D Yavagal, GJ Ahn
International Journal of Software Engineering and Knowledge Engineering 16 …, 2006
43 2006 Using semantic templates to study vulnerabilities recorded in large software repositories Y Wu, RA Gandhi, H Siy
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure …, 2010
41 2010 Social, Political, Economic, and Cultural R Gandhi, A Sharma, W Mahoney, W Sousan, Q Zhu, P Laplante
IEEE Technology and Society Magazine 1932 (4529/11), 2011
38 2011 An integrated framework for control system simulation and regulatory compliance monitoring W Mahoney, RA Gandhi
International Journal of Critical Infrastructure Protection 4 (1), 41-53, 2011
31 2011 Visual analytics for requirements-driven risk assessment RA Gandhi, SW Lee
Second International Workshop on Requirements Engineering Visualization (REV …, 2007
27 2007 Certification process artifacts defined as measurable units for software assurance SW Lee, RA Gandhi, GJ Ahn
Software Process: Improvement and Practice 12 (2), 165-189, 2007
24 2007 Common criteria requirements modeling and its uses for quality of information assurance (QoIA) DS Yavagal, SW Lee, GJ Ahn, RA Gandhi
Proceedings of the 43rd annual Southeast regional conference-Volume 2, 130-135, 2005
24 2005 Towards a requirements-driven workbench for supporting software certification and accreditation SW Lee, RA Gandhi, S Wagle
Third International Workshop on Software Engineering for Secure Systems …, 2007
22 2007 Authentication bypass and remote escalated I/O command attacks R Grandgenett, W Mahoney, R Gandhi
Proceedings of the 10th Annual Cyber and Information Security Research …, 2015
21 2015 Building a social dimensional threat model from current and historic events of cyber attacks AC Sharma, RA Gandhi, W Mahoney, W Sousan, Q Zhu
2010 IEEE Second International Conference on Social Computing, 981-986, 2010
21 2010 Discovering multidimensional correlations among regulatory requirements to understand risk RA Gandhi, SW Lee
ACM Transactions on Software Engineering and Methodology (TOSEM) 20 (4), 1-37, 2011
20 2011 Security requirements driven risk assessment for critical infrastructure information systems SW Lee, RA Gandhi, G Ahn
Proceedings of the Symposium on Requirements Engineering for Information …, 2005
20 2005 Determination of cross sections using the surrogate reaction ratio method R Gandhi, BK Nayak, SV Suryanarayana, A Pal, G Mohanto, S De, ...
Physical Review C 100 (5), 054613, 2019
19 2019 Empirical results on the study of software vulnerabilities (NIER track) Y Wu, H Siy, R Gandhi
Proceedings of the 33rd International Conference on Software Engineering …, 2011
18 2011 Discovering and understanding multi-dimensional correlations among certification requirements with application to risk assessment RA Gandhi, SW Lee
15th IEEE International Requirements Engineering Conference (RE 2007), 231-240, 2007
18 2007 Risk prioritization and management KM Crosby, RA Gandhi, H Siy
US Patent 9,525,698, 2016
17 2016