David Byers

According to our database1, David Byers authored at least 17 papers between 1997 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
An advanced approach for modeling and detecting software vulnerabilities.
Inf. Softw. Technol., 2012

2011
TRAP: Open Decentralized Distributed Spam Filtering.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2010
Unified modeling of attacks, vulnerabilities and security activities.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2010

2-clickAuth.
Proceedings of the ARES 2010, 2010

2009
A systematic evaluation of disk imaging in EnCase<sup>®</sup> 6.8 and LinEn 6.1.
Digit. Investig., 2009

Prioritisation and Selection of Software Security Activities.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors.
Digit. Investig., 2008

A Cause-Based Approach to Preventing Software Vulnerabilities.
Proceedings of the The Third International Conference on Availability, 2008

2007
Design of a Process for Software Security.
Proceedings of the The Second International Conference on Availability, 2007

How can the developer benefit from security modeling?
Proceedings of the The Second International Conference on Availability, 2007

2006
Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs.
Proceedings of the 22nd IEEE International Conference on Software Maintenance (ICSM 2006), 2006

Towards a structured unified process for software security.
Proceedings of the 2006 international workshop on Software engineering for secure systems, 2006

2001
Static Slicing and Parametric Polymorphism.
Proceedings of the 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 2001

Syntax-Directed Construction of Value Dependence Graphs.
Proceedings of the 2001 International Conference on Software Maintenance, 2001

1998
Full-Text Indexing of Non-Textual Resources.
Comput. Networks, 1998

1997
A Hybrid Approach to Propagation Analysis.
Proceedings of the Third International Workshop on Automated Debugging, 1997

The Design of a Test Case Definition Language.
Proceedings of the Third International Workshop on Automated Debugging, 1997


  Loading...