-
3
-
-
79959553529
-
Considerations in the preparation of a set of availability criteria
-
Ottawa, Canada, May
-
E. Bacic and M. Kuchta. Considerations in the Preparation of a Set of Availability Criteria. In Third Annual Canadian Computer Security Symposium, Ottawa, Canada, May 1991.
-
(1991)
Third Annual Canadian Computer Security Symposium
-
-
Bacic, E.1
Kuchta, M.2
-
4
-
-
84902507067
-
Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics
-
Toulouse, France, August. Kluwer
-
S. Chen, K. Pattabiraman, Z. Kalbarczyk, and R. Iyer. Formal reasoning of various categories of widely exploited security vulnerabilities by pointer taintedness semantics. In 19th International Information Security Conference, Toulouse, France, August 2004. Kluwer.
-
(2004)
19th International Information Security Conference
-
-
Chen, S.1
Pattabiraman, K.2
Kalbarczyk, Z.3
Iyer, R.4
-
9
-
-
0000713886
-
Aspect-oriented programming
-
G. Kiczales. Aspect-oriented programming. ACM Comput. Surv., 28(4es), 1996.
-
(1996)
ACM Comput. Surv.
, vol.28
, Issue.4 ES
-
-
Kiczales, G.1
-
10
-
-
82955230066
-
An overview of AspectJ
-
15th European Conf. on Object-Oriented Programming (ECOOP), Budapest, Hungary, June. Springer
-
G. Kiczales and E. Hilsdale et al. An Overview of AspectJ. In 15th European Conf. on Object-Oriented Programming (ECOOP), volume 2072 of Lecture Notes in Computer Science, Budapest, Hungary, June 2001. Springer.
-
(2001)
Lecture Notes in Computer Science
, vol.2072
-
-
Kiczales, G.1
Hilsdale, E.2
-
11
-
-
0035075103
-
A cost-based framework for analysis of denial of service networks
-
C. Meadows. A cost-based framework for analysis of denial of service networks. Journal of Computer Security, 9(1/2):143-164, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
12
-
-
0026850008
-
A ressource allocation model for denial of service
-
Oakland, CA
-
J. Millen. A ressource allocation model for denial of service. In IEEE Symposium on Security and Privacy, Oakland, CA, 1992.
-
(1992)
IEEE Symposium on Security and Privacy
-
-
Millen, J.1
-
13
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
J. Mirkovic and P. Reiher. A taxonomy of ddos attack and ddos defense mechanisms. SIGCOMM Comput. Commun. Rev., 34(2):39-53, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
14
-
-
0025441368
-
A specification and verification method for preventing denial of service
-
June
-
C. Yu and V. Gligor. A specification and verification method for preventing denial of service. IEEE Transactions on Software Engineering, 16(6):581-592, June 1990
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 581-592
-
-
Yu, C.1
Gligor, V.2
|