|
Search the dblp DataBase
Carol Taylor:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1994, pp:39-50 [Conf]
- Carol Taylor, Paul W. Oman, Axel W. Krings
Assessing Power Substation Network Security and Survivability: A Work in Progress Report. [Citation Graph (0, 0)][DBLP] Security and Management, 2003, pp:281-287 [Conf]
- Jim Alves-Foss, Carol Taylor, Paul W. Oman
A Multi-Layered Approach to Security in High Assurance Systems. [Citation Graph (0, 0)][DBLP] HICSS, 2004, pp:- [Conf]
- Carol Taylor, Jim Alves-Foss
Attack Recognition for System Survivability: A Low-level Approach. [Citation Graph (0, 0)][DBLP] HICSS, 2003, pp:335- [Conf]
- Carrie Gates, Carol Taylor
Challenging the anomaly detection paradigm: a provocative discussion. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:21-29 [Conf]
Security education: a roadmap to the future. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.001secs
|