Search the dblp DataBase
Gary McGraw :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
John Viega , J. T. Bloch , Y. Kohno , Gary McGraw ITS4: A Static Vulnerability Scanner for C and C++ Code. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:257-0 [Conf ] Gary McGraw , Douglas Hofstadter Letter Spirit: An Architecture for Creativity in an Microdomain. [Citation Graph (0, 0)][DBLP ] AI*IA, 1993, pp:65-70 [Conf ] Gary McGraw Software Security Clue Distribution. [Citation Graph (0, 0)][DBLP ] CSEE&T, 2004, pp:6-7 [Conf ] Srivaths Ravi , Paul C. Kocher , Ruby B. Lee , Gary McGraw , Anand Raghunathan Security as a new dimension in embedded system design. [Citation Graph (0, 0)][DBLP ] DAC, 2004, pp:753-760 [Conf ] Gary McGraw Software Security: Building Security In. [Citation Graph (0, 0)][DBLP ] ISSRE, 2006, pp:6- [Conf ] Christoph C. Michael , Gary McGraw Automated Software Test Data Generation for Complex Programs. [Citation Graph (0, 0)][DBLP ] ASE, 1998, pp:136-146 [Conf ] Christoph C. Michael , Gary McGraw , Michael Schatz , C. C. Walton Genetic Algorithms for Dynamic Test Data Generation. [Citation Graph (0, 0)][DBLP ] ASE, 1997, pp:307-308 [Conf ] Gary McGraw Weak links in e-commerce security: examples from the field. [Citation Graph (0, 0)][DBLP ] NDSS, 1998, pp:- [Conf ] Gary McGraw Will Openish Source Really Improve Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:128-129 [Conf ] Gary McGraw Exploiting Software. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2004, pp:- [Conf ] Gary McGraw On Bricks and Walls: Why Building Secure Software is Hard. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:3, pp:229-238 [Journal ] Gary McGraw Managing Software Security Risks. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2002, v:35, n:4, pp:99-101 [Journal ] Gary McGraw Software Assurence for Security. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1999, v:32, n:4, pp:103-105 [Journal ] Jeffrey M. Voas , Gary McGraw , Lora Kassab , Larry Voas A 'Crystal Ball' for Software Liability. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1997, v:30, n:6, pp:29-36 [Journal ] Noopur Davis , Watts S. Humphrey , Samuel T. Redwine Jr. , Gerlinde Zibulski , Gary McGraw Processes for Producing Secure Software: Summary of US National Cybersecurity Summit Subgroup Report. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:3, pp:18-25 [Journal ] Ivaan Arce , Gary McGraw Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:4, pp:17-19 [Journal ] Brad Arkin , Scott Stender , Gary McGraw Software Penetration Testing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:84-87 [Journal ] Sean Barnum , Gary McGraw Knowledge for Software Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:2, pp:74-78 [Journal ] Jeremy Epstein , Scott R. Matsumoto , Gary McGraw Software Security and SOA: Danger, Will Robinson! [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:1, pp:80-83 [Journal ] Brian Chess , Gary McGraw Static Analysis for Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:6, pp:76-79 [Journal ] Paco Hope , Gary McGraw , Annie I. Antón Misuse and Abuse Cases: Getting Past the Positive. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:3, pp:90-92 [Journal ] Gary McGraw From the Ground Up: The DIMACS Software Security Workshop. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:2, pp:59-66 [Journal ] Gary McGraw Software Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:2, pp:80-83 [Journal ] Gary McGraw , Bruce Potter Software Security Testing. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:5, pp:81-85 [Journal ] Nancy R. Mead , Gary McGraw A Portal for Software Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:75-79 [Journal ] Dan Taylor , Gary McGraw Adopting a Software Security Improvement Program. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:3, pp:88-91 [Journal ] Katrina Tsipenyuk , Brian Chess , Gary McGraw Seven Pernicious Kingdoms: A Taxonomy of Software Security Errors. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:6, pp:81-84 [Journal ] Denis Verdon , Gary McGraw Risk Analysis in Software Design. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:4, pp:79-84 [Journal ] Kenneth R. van Wyk , Gary McGraw Bridging the Gap between Software Development and Information Security. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:5, pp:75-79 [Journal ] Gary McGraw , Edward W. Felten Mobile Code and Security - Guest Editors' Introduction. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1998, v:2, n:6, pp:26-29 [Journal ] Ross J. Anderson , Terry Bollinger , Doug Brown , Enrique Draier , Philip Machanick , Gary McGraw , Nancy R. Mead , Arthur B. Pyster , Howard Schmidt , Timothy J. Shimeall Roundtable on Information Security Policy. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2000, v:17, n:5, pp:- [Journal ] Greg Hoglund , Gary McGraw Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2002, v:19, n:6, pp:56-59 [Journal ] Gary McGraw , J. Gregory Morrisett Attacking Malicious Code: A Report to the Infosec Research Council. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2000, v:17, n:5, pp:- [Journal ] John Viega , Tom Mutdosch , Gary McGraw , Edward W. Felten Statically Scanning Java Code: Finding Security Vulnerabilities. [Citation Graph (0, 0)][DBLP ] IEEE Software, 2000, v:17, n:5, pp:- [Journal ] Jeffrey M. Voas , Frank Charron , Gary McGraw , Keith W. Miller , Michael Friedman Predicting How Badly ``Good'' Software Can Behave. [Citation Graph (0, 0)][DBLP ] IEEE Software, 1997, v:14, n:4, pp:73-83 [Journal ] John Viega , J. T. Bloch , Tadayoshi Kohno , Gary McGraw Token-based scanning of source code for security problems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:3, pp:238-261 [Journal ] Christoph C. Michael , Gary McGraw , Michael Schatz Generating Software Test Data by Evolution. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2001, v:27, n:12, pp:1085-1110 [Journal ] An Automated Approach for Identifying Potential Vulnerabilities in Software. [Citation Graph (, )][DBLP ] Exploiting Online Games. [Citation Graph (, )][DBLP ] Automated Code Review Tools for Security. [Citation Graph (, )][DBLP ] Interview: Software Security in the Real World. [Citation Graph (, )][DBLP ] Search in 0.298secs, Finished in 0.302secs