AAAAAA

   
Results: 1-7 |
Results: 7

Authors: Michael, CC McGraw, G Schatz, MA
Citation: Cc. Michael et al., Generating software test data by evolution, IEEE SOFT E, 27(12), 2001, pp. 1085-1110

Authors: Mead, N Anderson, R McGraw, G Machanick, P Bollinger, T Shimeall, T Pyster, A Brown, D Draier, E Schmidt, H
Citation: N. Mead et al., Information security policy, IEEE SOFTW, 17(5), 2000, pp. 26-32

Authors: McGraw, G Morrisett, G
Citation: G. Mcgraw et G. Morrisett, Attacking malicious code: A report to the Infoses Research Council, IEEE SOFTW, 17(5), 2000, pp. 33

Authors: Viega, J McGraw, G Mutdosch, T Felten, EW
Citation: J. Viega et al., Statically scanning Java Code: Finding security vulnerabilities, IEEE SOFTW, 17(5), 2000, pp. 68

Authors: Cai, XG McGraw, G Pattisapu, JV von Kalm, L Willingham, S Socci, D Gibson, JS
Citation: Xg. Cai et al., Hydrocephalus in the H-Tx rat: A monogenic disease?, EXP NEUROL, 163(1), 2000, pp. 131-135

Authors: McGraw, G
Citation: G. Mcgraw, Software assurance for security, COMPUTER, 32(4), 1999, pp. 103-105

Authors: McGraw, G Felten, EW
Citation: G. Mcgraw et Ew. Felten, Mobile code and security, IEEE INTN C, 2(6), 1998, pp. 26-29
Risultati: 1-7 |