Search the dblp DataBase
John D. Powell :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ken Abernethy , John C. Kelly , Ann E. Kelley Sobel , James D. Kiper , John Powell Technology Transfer Issues for Formal Methods of Software Specification. [Citation Graph (0, 0)][DBLP ] CSEE&T, 2000, pp:23-31 [Conf ] Tim Menzies , John Powell , Michael E. Houle Fast Formal Analysis of Requirements via "Topoi Diagrams". [Citation Graph (0, 0)][DBLP ] ICSE, 2001, pp:391-400 [Conf ] Tim Menzies , Bojan Cukic , Harshinder Singh , John Powell Testing Nondeterminate Systems. [Citation Graph (0, 0)][DBLP ] ISSRE, 2000, pp:222-233 [Conf ] John D. Powell Determining Defect Trends and Identifying Critical Discriminators: A Case Study. [Citation Graph (0, 0)][DBLP ] IEEE METRICS, 2004, pp:- [Conf ] David P. Gilliam , John C. Kelly , John D. Powell , Matt Bishop Development of a Software Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:144-149 [Conf ] David P. Gilliam , John D. Powell Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP ] WETICE, 2002, pp:153-160 [Conf ] David P. Gilliam , John D. Powell , Matt Bishop Application of Lightweight Formal Methods to Software Security. [Citation Graph (0, 0)][DBLP ] WETICE, 2005, pp:160-165 [Conf ] David P. Gilliam , John D. Powell , Matt Bishop , Chris Andrew , Sameer Jog Security Verification Techniques Applied to PatchLink COTS Software. [Citation Graph (0, 0)][DBLP ] WETICE, 2006, pp:319-325 [Conf ] David P. Gilliam , John Powell , Eric Haugh , Matt Bishop Addressing Software Security and Mitigations in the Life Cycle. [Citation Graph (0, 0)][DBLP ] SEW, 2003, pp:201- [Conf ] Search in 0.001secs, Finished in 0.002secs