|
Search the dblp DataBase
Herbert H. Thompson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ibrahim K. El-Far, Chia-Chu Chiang, Stefan Gruner, Markus Montigel, Herbert H. Thompson
Editorial message: special track on software engineering: applications, practices, and tools. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:1511-1512 [Conf]
- Herbert H. Thompson, Chia-Chu Chiang, Ibrahim K. El-Far, Stefan Gruner, Markus Montigel, James A. Whittaker
Software Engineering Track Editorial. [Citation Graph (0, 0)][DBLP] SAC, 2003, pp:1076-1077 [Conf]
- Herbert H. Thompson, James A. Whittaker, Florence E. Mottay
Software security vulnerability testing in hostile environments. [Citation Graph (0, 0)][DBLP] SAC, 2002, pp:260-264 [Conf]
- Herbert H. Thompson
Why Security Testing Is Hard. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:4, pp:83-86 [Journal]
- Herbert H. Thompson
Application Penetration Testing. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:1, pp:66-69 [Journal]
- Herbert H. Thompson, Chia-Chu Chiang, Ibrahim K. El-Far, Stefan Gruner, Markus Montigel, James A. Whittaker
Special Issue on Software Engineering: Applications, Practices and Tools from the ACM Symposium on Applied Computing 2003. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 2004, v:46, n:5, pp:279-280 [Journal]
- Herbert H. Thompson, Richard Ford
Perfect Storm: The Insider, Naivety, and Hostility. [Citation Graph (0, 0)][DBLP] ACM Queue, 2004, v:2, n:4, pp:58-65 [Journal]
- James A. Whittaker, Herbert H. Thompson
Black Box Debugging. [Citation Graph (0, 0)][DBLP] ACM Queue, 2003, v:1, n:9, pp:68-74 [Journal]
Search in 0.001secs, Finished in 0.002secs
|