|
Search the dblp DataBase
Edward Amoroso:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Edward Amoroso, R. Kwapniewski
Selection Criteria for Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 1998, pp:280-0 [Conf]
- Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:39-50 [Conf]
- Edward Amoroso
A Policy Model for Denial of Service. [Citation Graph (0, 0)][DBLP] CSFW, 1990, pp:110-114 [Conf]
- Edward Amoroso
A graduate course in computing security technology. [Citation Graph (0, 0)][DBLP] SIGCSE, 1993, pp:251-255 [Conf]
- Edward Amoroso, T. Nguyen, Jonathan Weiss, John Watson, P. Lapiska, T. Starr
Toward an Approach to Measuring Software Trust. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:198-218 [Conf]
- Edward Amoroso, Eugene Kogan, Brenda McAnderson, Dan Powell, Brian Rexroad, Steve Schuster, Anthony Stramaglia
Local Area Detection of Incoming War Dial Activity. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1998, pp:486-491 [Conf]
- Marshall D. Abrams, Edward Amoroso, Leonard J. LaPadula, Teresa F. Lunt, James G. Williams
Report of an integrity research study group. [Citation Graph (0, 0)][DBLP] Computers & Security, 1993, v:12, n:7, pp:679-689 [Journal]
- Edward Amoroso, Matt Bishop
Secruity Enables Electronic Commerce. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 1996, v:4, n:3, pp:- [Journal]
Search in 0.005secs, Finished in 0.006secs
|