Thomas A. Longstaff

According to our database1, Thomas A. Longstaff authored at least 20 papers between 1993 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A Research Road Map for Building Secure and Resilient Software-Intensive Systems.
IEEE Secur. Priv., 2021

2014
REQcollect: Requirements Collection, Project Matching and Technology Transition.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
DART3: DHS Assistant for R&D Tracking and Technology Transfer.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2011
DART3: DHS assistant for R&D tracking and technology transfer.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Why is there no science in cyber science?: a panel discussion at NSPW 2010.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

Cyber science: moving from the toes to the shoulders of giants.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Barriers to science in security.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Computational Evaluation of Software Security Attributes.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

DOE grass roots panel.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2004
Characterization of defense mechanisms against distributed denial of service attacks.
Comput. Secur., 2004

The Economic Incentives Of Providing Network Security Services On The Internet Infrastructure.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2002
A holistic roadmap for survivable infrastructure systems.
IEEE Trans. Syst. Man Cybern. Part A, 2002

2000
Are We Forgetting the Risks of Information Technology?
Computer, 2000

Survivability Analysis of Network Specifications.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

1999
Survivable Network System Analysis: A Case Study.
IEEE Softw., 1999

Survivability: Protecting Your Critical Systems.
IEEE Internet Comput., 1999

1998
Case Study in Survivable Network System Analysis
CoRR, 1998

The Architecture Tradeoff Analysis Method.
Proceedings of the 4th International Conference on Engineering of Complex Computer Systems (ICECCS '98), 1998

1996
A Sense of Self for Unix Processes.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

1993
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code.
Comput. Secur., 1993


  Loading...