Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-7
|
Results: 7
Generating software test data by evolution
Authors:
Michael, CC McGraw, G Schatz, MA
Citation:
Cc. Michael et al., Generating software test data by evolution, IEEE SOFT E, 27(12), 2001, pp. 1085-1110
Information security policy
Authors:
Mead, N Anderson, R McGraw, G Machanick, P Bollinger, T Shimeall, T Pyster, A Brown, D Draier, E Schmidt, H
Citation:
N. Mead et al., Information security policy, IEEE SOFTW, 17(5), 2000, pp. 26-32
Attacking malicious code: A report to the Infoses Research Council
Authors:
McGraw, G Morrisett, G
Citation:
G. Mcgraw et G. Morrisett, Attacking malicious code: A report to the Infoses Research Council, IEEE SOFTW, 17(5), 2000, pp. 33
Statically scanning Java Code: Finding security vulnerabilities
Authors:
Viega, J McGraw, G Mutdosch, T Felten, EW
Citation:
J. Viega et al., Statically scanning Java Code: Finding security vulnerabilities, IEEE SOFTW, 17(5), 2000, pp. 68
Hydrocephalus in the H-Tx rat: A monogenic disease?
Authors:
Cai, XG McGraw, G Pattisapu, JV von Kalm, L Willingham, S Socci, D Gibson, JS
Citation:
Xg. Cai et al., Hydrocephalus in the H-Tx rat: A monogenic disease?, EXP NEUROL, 163(1), 2000, pp. 131-135
Software assurance for security
Authors:
McGraw, G
Citation:
G. Mcgraw, Software assurance for security, COMPUTER, 32(4), 1999, pp. 103-105
Mobile code and security
Authors:
McGraw, G Felten, EW
Citation:
G. Mcgraw et Ew. Felten, Mobile code and security, IEEE INTN C, 2(6), 1998, pp. 26-29
Risultati:
1-7
|