|
Search the dblp DataBase
Joseph Giordano:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Joon S. Park, Gautam Jayaprakash, Joseph Giordano
Component Integrity Check and Recovery Against Malicious Codes. [Citation Graph (0, 0)][DBLP] AINA (2), 2006, pp:466-470 [Conf]
- Brajendra Panda, Joseph Giordano
Reconstructing the Database after Electronic Attacks. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:143-156 [Conf]
- Shiu-Kai Chin, John Faust, Joseph Giordano
Integrating formal methods tools to support system design. [Citation Graph (0, 0)][DBLP] ICECCS, 1995, pp:88-0 [Conf]
- Shiu-Kai Chin, John Faust, Joseph Giordano
Formal Methods Applied to Secure Network Engineering. [Citation Graph (0, 0)][DBLP] ICECCS, 1996, pp:344-351 [Conf]
- Joon S. Park, Joseph Giordano
Access Control Requirements for Preventing Insider Threats. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:529-534 [Conf]
- Victor A. Skormin, José G. Delgado-Frias, Dennis L. McGee, Joseph Giordano, Leonard J. Popyack, Vladimir I. Gorodetski, Alexander O. Tarakanov
BASIS: A Biological Approach to System Information Security. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2001, pp:127-142 [Conf]
- Brajendra Panda, Joseph Giordano
An overview of post information warfare data recovery. [Citation Graph (0, 0)][DBLP] SAC, 1998, pp:253-254 [Conf]
- Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:127-142 [Conf]
- Brajendra Panda, Joseph Giordano
Defensive Information Warfare - Introduction. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1999, v:42, n:7, pp:30-32 [Journal]
- Brajendra Panda, Joseph Giordano, Daniel Kalil
Introduction. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2006, v:49, n:2, pp:44-47 [Journal]
- Nong Ye, Joseph Giordano, John Feldman
A process control approach to cyber attack detection. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2001, v:44, n:8, pp:76-82 [Journal]
- Joon S. Park, Pratheep Chandramohan, Joseph Giordano
Component-abnormality detection and immunization for survivable systems in large distributed environments. [Citation Graph (0, 0)][DBLP] IASTED Conf. on Software Engineering and Applications, 2004, pp:102-108 [Conf]
Role-based profile analysis for scalable and accurate insider-anomaly detection. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|