The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James A. Whittaker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matt Bishop, Anup K. Ghosh, James A. Whittaker
    How Useful is Software Fault Injection for Evaluating the Security of COTS Products? [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:339-342 [Conf]
  2. Giampaolo Bella, Ronaldo Menezes, James A. Whittaker
    Editorial Message: special track on computer security. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:194-195 [Conf]
  3. Herbert H. Thompson, Chia-Chu Chiang, Ibrahim K. El-Far, Stefan Gruner, Markus Montigel, James A. Whittaker
    Software Engineering Track Editorial. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:1076-1077 [Conf]
  4. Herbert H. Thompson, James A. Whittaker, Florence E. Mottay
    Software security vulnerability testing in hostile environments. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:260-264 [Conf]
  5. James A. Whittaker, Andres De Vivanco
    Neutralizing windows-based malicious mobile code. [Citation Graph (0, 0)][DBLP]
    SAC, 2002, pp:242-246 [Conf]
  6. James A. Whittaker
    Stochastic Software Testing. [Citation Graph (0, 0)][DBLP]
    Ann. Software Eng., 1997, v:4, n:, pp:115-131 [Journal]
  7. James A. Whittaker, Jeffrey M. Voas
    Toward a More Reliable Theory of Software Reliability. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:12, pp:36-42 [Journal]
  8. Mike Andrews, James A. Whittaker
    Computer Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:68-71 [Journal]
  9. Daniel E. Geer Jr., David Aucsmith, James A. Whittaker
    Monoculture. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:6, pp:14-19 [Journal]
  10. Martin R. Stytz, James A. Whittaker
    Software Protection: Security's Last Stand? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:95-98 [Journal]
  11. Martin R. Stytz, James A. Whittaker
    Caution: This Product Contains Security Code. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:5, pp:86-88 [Journal]
  12. James A. Whittaker
    Why Secure Applications are Difficult to Write. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:81-83 [Journal]
  13. James A. Whittaker, Richard Ford
    How to Think about Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:68-71 [Journal]
  14. Jesse H. Poore, Gwendolyn H. Walton, James A. Whittaker
    A constraint-based approach to the representation of software usage models. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2000, v:42, n:12, pp:825-833 [Journal]
  15. Ahmed M. Salem, Kamel Rekab, James A. Whittaker
    Prediction of software failures through logistic regression. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2004, v:46, n:12, pp:781-789 [Journal]
  16. Herbert H. Thompson, Chia-Chu Chiang, Ibrahim K. El-Far, Stefan Gruner, Markus Montigel, James A. Whittaker
    Special Issue on Software Engineering: Applications, Practices and Tools from the ACM Symposium on Applied Computing 2003. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2004, v:46, n:5, pp:279-280 [Journal]
  17. James A. Whittaker, Kamel Rekab, Michael G. Thomason
    A Markov chain model for predicting the reliability of multi-build software. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2000, v:42, n:12, pp:889-894 [Journal]
  18. James A. Whittaker, Herbert H. Thompson
    Black Box Debugging. [Citation Graph (0, 0)][DBLP]
    ACM Queue, 2003, v:1, n:9, pp:68-74 [Journal]
  19. Anup K. Ghosh, Chuck Howell, James A. Whittaker
    Building Software Securely from the Ground Up. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2002, v:19, n:1, pp:14-16 [Journal]
  20. James A. Whittaker
    What Is Software Testing? Why Is It So Hard? Practice Tutorial. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:1, pp:- [Journal]
  21. James A. Whittaker
    Software's Invisible Users. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2001, v:18, n:3, pp:- [Journal]
  22. James A. Whittaker, Steven Atkin
    Software Engineering is Not Enough. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2002, v:19, n:4, pp:108-115 [Journal]
  23. James A. Whittaker, Jesse H. Poore
    Markow Analysis of Software Specifications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 1993, v:2, n:1, pp:93-106 [Journal]
  24. James A. Whittaker, Michael G. Thomason
    A Markov Chain Model for Statistical Software Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1994, v:20, n:10, pp:812-824 [Journal]

Search in 0.055secs, Finished in 0.056secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002