The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Carol Taylor: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss
    A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:39-50 [Conf]
  2. Carol Taylor, Paul W. Oman, Axel W. Krings
    Assessing Power Substation Network Security and Survivability: A Work in Progress Report. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:281-287 [Conf]
  3. Jim Alves-Foss, Carol Taylor, Paul W. Oman
    A Multi-Layered Approach to Security in High Assurance Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  4. Carol Taylor, Jim Alves-Foss
    Attack Recognition for System Survivability: A Low-level Approach. [Citation Graph (0, 0)][DBLP]
    HICSS, 2003, pp:335- [Conf]
  5. Carrie Gates, Carol Taylor
    Challenging the anomaly detection paradigm: a provocative discussion. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:21-29 [Conf]

  6. Security education: a roadmap to the future. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002