|
Search the dblp DataBase
David Byers:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- David Byers, Magnus Engström, Mariam Kamkar
The Design of a Test Case Definition Language. [Citation Graph (0, 0)][DBLP] AADEBUG, 1997, pp:69-78 [Conf]
- David Byers, Mariam Kamkar
A Hybrid Approach to Propagation Analysis. [Citation Graph (0, 0)][DBLP] AADEBUG, 1997, pp:193-197 [Conf]
- David Byers, Mariam Kamkar, Ture Pålsson
Syntax-Directed Construction of Value Dependence Graphs. [Citation Graph (0, 0)][DBLP] ICSM, 2001, pp:692-0 [Conf]
- David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma
Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs. [Citation Graph (0, 0)][DBLP] ICSM, 2006, pp:411-422 [Conf]
- David Byers, Mariam Kamkar
Static Slicing and Parametric Polymorphism. [Citation Graph (0, 0)][DBLP] SCAM, 2001, pp:181-186 [Conf]
- David Byers
Full-Text Indexing of Non-Textual Resources. [Citation Graph (0, 0)][DBLP] Computer Networks, 1998, v:30, n:1-7, pp:141-148 [Journal]
Design of a Process for Software Security. [Citation Graph (, )][DBLP]
How can the developer benefit from security modeling? [Citation Graph (, )][DBLP]
A Cause-Based Approach to Preventing Software Vulnerabilities. [Citation Graph (, )][DBLP]
Prioritisation and Selection of Software Security Activities. [Citation Graph (, )][DBLP]
2-clickAuth. [Citation Graph (, )][DBLP]
Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors. [Citation Graph (, )][DBLP]
A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|