Joseph Giordano

According to our database1, Joseph Giordano authored at least 16 papers between 1995 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Component survivability at runtime for mission-critical distributed systems.
J. Supercomput., 2013

2006
Introduction.
Commun. ACM, 2006

Access Control Requirements for Preventing Insider Threats.
Proceedings of the Intelligence and Security Informatics, 2006

Role-based profile analysis for scalable and accurate insider-anomaly detection.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

Component Integrity Check and Recovery Against Malicious Codes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

2004
Component-abnormality detection and immunization for survivable systems in large distributed environments.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

2002
Cyber Forensics: A Military Operations Perspective.
Int. J. Digit. EVid., 2002

2001
A process control approach to cyber attack detection.
Commun. ACM, 2001

BASIS: A Biological Approach to System Information Security.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

1999
Defensive Information Warfare - Introduction.
Commun. ACM, 1999

1998
An overview of post information warfare data recovery.
Proceedings of the 1998 ACM symposium on Applied Computing, 1998

Reconstructing the Database after Electronic Attacks.
Proceedings of the Database Security XII: Status and Prospects, 1998

1996
Formal Methods Applied to Secure Network Engineering.
Proceedings of the 2nd IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '96), 1996

1995
Integrating formal methods tools to support system design.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995


  Loading...