The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Thomas A. Longstaff: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Sanjay K. Jha, Jeannette M. Wing, Richard C. Linger, Thomas A. Longstaff
    Survivability Analysis of Network Specifications. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:613-622 [Conf]
  2. Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas A. Longstaff, Howard F. Lipson, S. Jeromy Carrière
    The Architecture Tradeoff Analysis Method. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1998, pp:68-78 [Conf]
  3. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff
    A Sense of Self for Unix Processes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:120-128 [Conf]
  4. Li-Chiou Chen, Thomas A. Longstaff, Kathleen M. Carley
    Characterization of defense mechanisms against distributed denial of service attacks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2004, v:23, n:8, pp:665-678 [Journal]
  5. Thomas A. Longstaff, E. Eugene Schultz
    Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:1, pp:61-77 [Journal]
  6. Thomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes
    Are We Forgetting the Risks of Information Technology? [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:12, pp:43-51 [Journal]
  7. Robert J. Ellison, Richard C. Linger, Thomas A. Longstaff, Nancy R. Mead
    Case Study in Survivable Network System Analysis [Citation Graph (0, 0)][DBLP]
    CoRR, 1998, v:0, n:, pp:- [Journal]
  8. Robert J. Ellison, David A. Fisher, Richard C. Linger, Howard F. Lipson, Thomas A. Longstaff, Nancy R. Mead
    Survivability: Protecting Your Critical Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1999, v:3, n:6, pp:55-63 [Journal]
  9. Robert J. Ellison, Richard C. Linger, Thomas A. Longstaff, Nancy R. Mead
    Survivable Network System Analysis: A Case Study. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1999, v:16, n:4, pp:70-77 [Journal]
  10. Thomas A. Longstaff, Yacov Y. Haimes
    A holistic roadmap for survivable infrastructure systems. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2002, v:32, n:2, pp:260-268 [Journal]

  11. Computational Evaluation of Software Security Attributes. [Citation Graph (, )][DBLP]


Search in 0.036secs, Finished in 0.037secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002