The SCEAS System
Navigation Menu

Search the dblp DataBase


Edward Amoroso: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Edward Amoroso, R. Kwapniewski
    Selection Criteria for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:280-0 [Conf]
  2. Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss
    A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:39-50 [Conf]
  3. Edward Amoroso
    A Policy Model for Denial of Service. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:110-114 [Conf]
  4. Edward Amoroso
    A graduate course in computing security technology. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 1993, pp:251-255 [Conf]
  5. Edward Amoroso, T. Nguyen, Jonathan Weiss, John Watson, P. Lapiska, T. Starr
    Toward an Approach to Measuring Software Trust. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:198-218 [Conf]
  6. Edward Amoroso, Eugene Kogan, Brenda McAnderson, Dan Powell, Brian Rexroad, Steve Schuster, Anthony Stramaglia
    Local Area Detection of Incoming War Dial Activity. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1998, pp:486-491 [Conf]
  7. Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams
    Report of an integrity research study group. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:7, pp:679-689 [Journal]
  8. Edward Amoroso, Matt Bishop
    Secruity Enables Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1996, v:4, n:3, pp:- [Journal]

Search in 0.005secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002