David P. Gilliam

According to our database1, David P. Gilliam authored at least 18 papers between 2000 and 2008.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Twelfth Securities Technologies (ST) Workshop Report.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

2007
ST Workshop Final Report.
Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 2007

2006
Security Verification Techniques Applied to PatchLink COTS Software.
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006

Eleventh Securities Technologies (ST) Workshop Report.
Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 2006

2005
Self Port Scanning Tool: Providing a More Secure Computing Environment Through the Use of Proactive Port Scanning.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Application of Lightweight Formal Methods to Software Security.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

WETICE 2005 Tenth Securities Technologies (ST) Workshop Report (Formerly Enterprise Security (ES)).
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

2004
Security Risks: Management and Mitigation in the Software Life Cycle.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

WETICE 2004 Ninth Enterprise Security (ES) Workshop Report.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

2003
Deployment of anti-virus software: a case study.
Inf. Manag. Comput. Secur., 2003

Software Security Checklist for the Software Life Cycle.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Eighth Enterprise Security (ES) Workshop Report.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Addressing Software Security and Mitigations in the Life Cycle.
Proceedings of the 28th Annual IEEE / NASA Software Engineering Workshop (SEW-28 2003), 2003

Managing Information Technology Security Risk.
Proceedings of the Software Security, 2003

2002
Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

Summary Report on Enterprise Security Workshop.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

2001
Development of a Software Security Assessment Instrument to Reduce Software Security Risk.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

2000
Reducing Software Security Risk through an Integrated Approach.
Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2000), 2000


  Loading...