Search the dblp DataBase
David P. Gilliam :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
David P. Gilliam Managing Information Technology Security Risk. [Citation Graph (0, 0)][DBLP ] ISSS, 2003, pp:296-317 [Conf ] David P. Gilliam Summary Report on Enterprise Security Workshop. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:43-48 [Conf ] David P. Gilliam Eighth Enterprise Security (ES) Workshop Report. [Citation Graph (0, 0)][DBLP ] WETICE, 2003, pp:179-183 [Conf ] David P. Gilliam WETICE 2004 Ninth Enterprise Security (ES) Workshop Report. [Citation Graph (0, 0)][DBLP ] WETICE, 2004, pp:195-197 [Conf ] David P. Gilliam Security Risks: Management and Mitigation in the Software Life Cycle. [Citation Graph (0, 0)][DBLP ] WETICE, 2004, pp:211-216 [Conf ] David P. Gilliam WETICE 2005 Tenth Securities Technologies (ST) Workshop Report (Formerly Enterprise Security (ES)). [Citation Graph (0, 0)][DBLP ] WETICE, 2005, pp:135-137 [Conf ] David P. Gilliam , John C. Kelly , John D. Powell , Matt Bishop Development of a Software Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:144-149 [Conf ] David P. Gilliam , John D. Powell Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:153-160 [Conf ] David P. Gilliam , John D. Powell , Matt Bishop Application of Lightweight Formal Methods to Software Security. [Citation Graph (0, 0)][DBLP ] WETICE, 2005, pp:160-165 [Conf ] David P. Gilliam , Thomas L. Wolfe , Joseph S. Sherif , Matt Bishop Software Security Checklist for the Software Life Cycle. [Citation Graph (0, 0)][DBLP ] WETICE, 2003, pp:243-248 [Conf ] David P. Gilliam , John C. Kelly , Matt Bishop Reducing Software Security Risk through an Integrated Approach. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:141-146 [Conf ] Joshua E. Kocher , David P. Gilliam Self Port Scanning Tool: Providing a More Secure Computing Environment Through the Use of Proactive Port Scanning. [Citation Graph (0, 0)][DBLP ] WETICE, 2005, pp:139-143 [Conf ] David P. Gilliam , John D. Powell , Matt Bishop , Chris Andrew , Sameer Jog Security Verification Techniques Applied to PatchLink COTS Software. [Citation Graph (0, 0)][DBLP ] WETICE, 2006, pp:319-325 [Conf ] David P. Gilliam , Matt Bishop Eleventh Securities Technologies (ST) Workshop Report. [Citation Graph (0, 0)][DBLP ] WETICE, 2006, pp:305-306 [Conf ] David P. Gilliam , John Powell , Eric Haugh , Matt Bishop Addressing Software Security and Mitigations in the Life Cycle. [Citation Graph (0, 0)][DBLP ] SEW, 2003, pp:201- [Conf ] Joseph S. Sherif , David P. Gilliam Deployment of anti-virus software: a case study. [Citation Graph (0, 0)][DBLP ] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:5-10 [Journal ] ST Workshop Final Report. [Citation Graph (, )][DBLP ] Twelfth Securities Technologies (ST) Workshop Report. [Citation Graph (, )][DBLP ] Search in 0.014secs, Finished in 0.015secs