iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/ICECCS.2004.1310923
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:56:42Z","timestamp":1729630602754,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iceccs.2004.1310923","type":"proceedings-article","created":{"date-parts":[[2004,9,28]],"date-time":"2004-09-28T09:50:22Z","timestamp":1096365022000},"page":"239-248","source":"Crossref","is-referenced-by-count":7,"title":["Software information leaks: a complexity perspective"],"prefix":"10.1109","author":[{"given":"B.","family":"George","sequence":"first","affiliation":[]},{"given":"S.A.","family":"Bohner","sequence":"additional","affiliation":[]},{"given":"R.","family":"Prieto-Diaz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1142\/S021819400100061X"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1992.1263033"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/32.58784"},{"journal-title":"A Graph Traceability Approach to Software Change Impact Analysis in Computer Science","year":"1995","author":"bohner","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/32.58785"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.1994.292398"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1109\/ICSM.1998.738521","article-title":"Improved Visual Impact Analysis","author":"hutchins","year":"1998","journal-title":"International Conference on Software Maintenance"},{"journal-title":"The Common Criteria Evaluation Process Process Explanation Shortcomings and Research Opportunities Commonwealth Information Security Center Technical Report CISC-TR-2002–003","year":"2002","author":"prieto-diaz","key":"ref18"},{"journal-title":"Software Security Impact Analysis Visualization Research Report","year":"2003","author":"bohner","key":"ref19"},{"journal-title":"Automated Life Cycle Impact Analysis System","year":"1986","key":"ref4"},{"journal-title":"Workshop on Software Engineering Decision Support 14th International Conference on Software Engineering and Knowledge Engineering","article-title":"Visualisation for Informed Decision Making; From Code to Components","year":"2002","author":"charters","key":"ref27"},{"journal-title":"IDEFO\/SADT Business Process and Enterprise Modeling","year":"1998","author":"marca","key":"ref3"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/141874.141884","volume":"17","author":"perry","year":"1992","journal-title":"Foundations for the Study of Software Architecture ACM SIGSOFT"},{"journal-title":"Software Evolution","first-page":"1202","year":"1994","author":"lehman","key":"ref5"},{"journal-title":"Complexity is Just a Word! in Technological Forecasting and Social Change","year":"2001","author":"coming","key":"ref8"},{"journal-title":"Extreme Programming Explained Embrace Change Reading Massachusetts","year":"2000","author":"beck","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1207455"},{"key":"ref9","first-page":"183","volume":"46","author":"scacchi","year":"1999","journal-title":"Experience with Software Process Simulation and Modeling Journal of Systems and Software"},{"journal-title":"The uncertainty principle in software engineering in International Conference on Software Engineering","year":"1997","author":"ziv","key":"ref1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/32.895989","article-title":"Toward Reference Models for Requirement Traceability","volume":"27","author":"balasubramaniam","year":"2001","journal-title":"IEEE Transactions on Software Engineering"},{"journal-title":"for the IEEE Computer Society Publications Tutorial Series","article-title":"Software Change Impact Analysis","year":"1996","author":"bohner","key":"ref22"},{"key":"ref21","first-page":"256","article-title":"Issues in the development of a requirements traceability model","volume":"4","author":"ramesh","year":"1993","journal-title":"IEEE International Symposium on Requirements Engineering"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1989.714465"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1232285"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2003.1251451"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018972323770"}],"event":{"name":"Proceedings. Ninth IEEE International Conference on Engineering of Complex Computer Systems","acronym":"ICECCS-04","location":"Florence, Italy"},"container-title":["Proceedings. Ninth IEEE International Conference on Engineering of Complex Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9173\/29106\/01310923.pdf?arnumber=1310923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,8]],"date-time":"2018-08-08T05:38:10Z","timestamp":1533706690000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1310923\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iceccs.2004.1310923","relation":{},"subject":[]}}