Edward Amoroso

According to our database1, Edward Amoroso authored at least 14 papers between 1990 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Recent Progress in Software Security.
IEEE Softw., 2018

2014
Practical Methods for Securing the Cloud.
IEEE Cloud Comput., 2014

2013
A View from the C-Suite.
IEEE Secur. Priv., 2013

From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud.
IEEE Secur. Priv., 2013

2011
Cyber attacks: awareness.
Netw. Secur., 2011

1998
Local Area Detection of Incoming War Dial Activity.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Selection Criteria for Intrusion Detection Systems.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1996
Secruity Enables Electronic Commerce.
J. Netw. Syst. Manag., 1996

1994
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
Proceedings of the CCS '94, 1994

Composing system integrity using I/O automata.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Report of an integrity research study group.
Comput. Secur., 1993

A graduate course in computing security technology.
Proceedings of the 24th SIGCSE Technical Symposium on Computer Science Education, 1993

1991
Toward an Approach to Measuring Software Trust.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

1990
A Policy Model for Denial of Service.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990


  Loading...