The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David P. Gilliam: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David P. Gilliam
    Managing Information Technology Security Risk. [Citation Graph (0, 0)][DBLP]
    ISSS, 2003, pp:296-317 [Conf]
  2. David P. Gilliam
    Summary Report on Enterprise Security Workshop. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:43-48 [Conf]
  3. David P. Gilliam
    Eighth Enterprise Security (ES) Workshop Report. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:179-183 [Conf]
  4. David P. Gilliam
    WETICE 2004 Ninth Enterprise Security (ES) Workshop Report. [Citation Graph (0, 0)][DBLP]
    WETICE, 2004, pp:195-197 [Conf]
  5. David P. Gilliam
    Security Risks: Management and Mitigation in the Software Life Cycle. [Citation Graph (0, 0)][DBLP]
    WETICE, 2004, pp:211-216 [Conf]
  6. David P. Gilliam
    WETICE 2005 Tenth Securities Technologies (ST) Workshop Report (Formerly Enterprise Security (ES)). [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:135-137 [Conf]
  7. David P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop
    Development of a Software Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:144-149 [Conf]
  8. David P. Gilliam, John D. Powell
    Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP]
    WETICE, 2002, pp:153-160 [Conf]
  9. David P. Gilliam, John D. Powell, Matt Bishop
    Application of Lightweight Formal Methods to Software Security. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:160-165 [Conf]
  10. David P. Gilliam, Thomas L. Wolfe, Joseph S. Sherif, Matt Bishop
    Software Security Checklist for the Software Life Cycle. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:243-248 [Conf]
  11. David P. Gilliam, John C. Kelly, Matt Bishop
    Reducing Software Security Risk through an Integrated Approach. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:141-146 [Conf]
  12. Joshua E. Kocher, David P. Gilliam
    Self Port Scanning Tool: Providing a More Secure Computing Environment Through the Use of Proactive Port Scanning. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:139-143 [Conf]
  13. David P. Gilliam, John D. Powell, Matt Bishop, Chris Andrew, Sameer Jog
    Security Verification Techniques Applied to PatchLink COTS Software. [Citation Graph (0, 0)][DBLP]
    WETICE, 2006, pp:319-325 [Conf]
  14. David P. Gilliam, Matt Bishop
    Eleventh Securities Technologies (ST) Workshop Report. [Citation Graph (0, 0)][DBLP]
    WETICE, 2006, pp:305-306 [Conf]
  15. David P. Gilliam, John Powell, Eric Haugh, Matt Bishop
    Addressing Software Security and Mitigations in the Life Cycle. [Citation Graph (0, 0)][DBLP]
    SEW, 2003, pp:201- [Conf]
  16. Joseph S. Sherif, David P. Gilliam
    Deployment of anti-virus software: a case study. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:5-10 [Journal]

  17. ST Workshop Final Report. [Citation Graph (, )][DBLP]


  18. Twelfth Securities Technologies (ST) Workshop Report. [Citation Graph (, )][DBLP]


Search in 0.014secs, Finished in 0.015secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002