The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gary McGraw: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Viega, J. T. Bloch, Y. Kohno, Gary McGraw
    ITS4: A Static Vulnerability Scanner for C and C++ Code. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:257-0 [Conf]
  2. Gary McGraw, Douglas Hofstadter
    Letter Spirit: An Architecture for Creativity in an Microdomain. [Citation Graph (0, 0)][DBLP]
    AI*IA, 1993, pp:65-70 [Conf]
  3. Gary McGraw
    Software Security Clue Distribution. [Citation Graph (0, 0)][DBLP]
    CSEE&T, 2004, pp:6-7 [Conf]
  4. Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary McGraw, Anand Raghunathan
    Security as a new dimension in embedded system design. [Citation Graph (0, 0)][DBLP]
    DAC, 2004, pp:753-760 [Conf]
  5. Gary McGraw
    Software Security: Building Security In. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2006, pp:6- [Conf]
  6. Christoph C. Michael, Gary McGraw
    Automated Software Test Data Generation for Complex Programs. [Citation Graph (0, 0)][DBLP]
    ASE, 1998, pp:136-146 [Conf]
  7. Christoph C. Michael, Gary McGraw, Michael Schatz, C. C. Walton
    Genetic Algorithms for Dynamic Test Data Generation. [Citation Graph (0, 0)][DBLP]
    ASE, 1997, pp:307-308 [Conf]
  8. Gary McGraw
    Weak links in e-commerce security: examples from the field. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  9. Gary McGraw
    Will Openish Source Really Improve Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:128-129 [Conf]
  10. Gary McGraw
    Exploiting Software. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  11. Gary McGraw
    On Bricks and Walls: Why Building Secure Software is Hard. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:3, pp:229-238 [Journal]
  12. Gary McGraw
    Managing Software Security Risks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2002, v:35, n:4, pp:99-101 [Journal]
  13. Gary McGraw
    Software Assurence for Security. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:4, pp:103-105 [Journal]
  14. Jeffrey M. Voas, Gary McGraw, Lora Kassab, Larry Voas
    A 'Crystal Ball' for Software Liability. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1997, v:30, n:6, pp:29-36 [Journal]
  15. Noopur Davis, Watts S. Humphrey, Samuel T. Redwine Jr., Gerlinde Zibulski, Gary McGraw
    Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:18-25 [Journal]
  16. Ivaan Arce, Gary McGraw
    Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:17-19 [Journal]
  17. Brad Arkin, Scott Stender, Gary McGraw
    Software Penetration Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:84-87 [Journal]
  18. Sean Barnum, Gary McGraw
    Knowledge for Software Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:74-78 [Journal]
  19. Jeremy Epstein, Scott R. Matsumoto, Gary McGraw
    Software Security and SOA: Danger, Will Robinson! [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:1, pp:80-83 [Journal]
  20. Brian Chess, Gary McGraw
    Static Analysis for Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:6, pp:76-79 [Journal]
  21. Paco Hope, Gary McGraw, Annie I. Antón
    Misuse and Abuse Cases: Getting Past the Positive. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:90-92 [Journal]
  22. Gary McGraw
    From the Ground Up: The DIMACS Software Security Workshop. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:2, pp:59-66 [Journal]
  23. Gary McGraw
    Software Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:80-83 [Journal]
  24. Gary McGraw, Bruce Potter
    Software Security Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:81-85 [Journal]
  25. Nancy R. Mead, Gary McGraw
    A Portal for Software Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:75-79 [Journal]
  26. Dan Taylor, Gary McGraw
    Adopting a Software Security Improvement Program. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:88-91 [Journal]
  27. Katrina Tsipenyuk, Brian Chess, Gary McGraw
    Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:6, pp:81-84 [Journal]
  28. Denis Verdon, Gary McGraw
    Risk Analysis in Software Design. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:79-84 [Journal]
  29. Kenneth R. van Wyk, Gary McGraw
    Bridging the Gap between Software Development and Information Security. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:5, pp:75-79 [Journal]
  30. Gary McGraw, Edward W. Felten
    Mobile Code and Security - Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:6, pp:26-29 [Journal]
  31. Ross J. Anderson, Terry Bollinger, Doug Brown, Enrique Draier, Philip Machanick, Gary McGraw, Nancy R. Mead, Arthur B. Pyster, Howard Schmidt, Timothy J. Shimeall
    Roundtable on Information Security Policy. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  32. Greg Hoglund, Gary McGraw
    Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2002, v:19, n:6, pp:56-59 [Journal]
  33. Gary McGraw, J. Gregory Morrisett
    Attacking Malicious Code: A Report to the Infosec Research Council. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  34. John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten
    Statically Scanning Java Code: Finding Security Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 2000, v:17, n:5, pp:- [Journal]
  35. Jeffrey M. Voas, Frank Charron, Gary McGraw, Keith W. Miller, Michael Friedman
    Predicting How Badly ``Good'' Software Can Behave. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1997, v:14, n:4, pp:73-83 [Journal]
  36. John Viega, J. T. Bloch, Tadayoshi Kohno, Gary McGraw
    Token-based scanning of source code for security problems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:238-261 [Journal]
  37. Christoph C. Michael, Gary McGraw, Michael Schatz
    Generating Software Test Data by Evolution. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2001, v:27, n:12, pp:1085-1110 [Journal]

  38. An Automated Approach for Identifying Potential Vulnerabilities in Software. [Citation Graph (, )][DBLP]


  39. Exploiting Online Games. [Citation Graph (, )][DBLP]


  40. Automated Code Review Tools for Security. [Citation Graph (, )][DBLP]


  41. Interview: Software Security in the Real World. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.304secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002