Author of the publication

Application of Lightweight Formal Methods to Software Security.

, , and . WETICE, page 160-165. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk., and . WETICE, page 153-160. IEEE Computer Society, (2002)Application of Lightweight Formal Methods to Software Security., , and . WETICE, page 160-165. IEEE Computer Society, (2005)Deployment of anti-virus software: a case study., and . Inf. Manag. Comput. Security, 11 (1): 5-10 (2003)Summary Report on Enterprise Security Workshop.. WETICE, page 43-48. IEEE Computer Society, (2002)Eleventh Securities Technologies (ST) Workshop Report., and . WETICE, page 305-306. IEEE Computer Society, (2006)Managing Information Technology Security Risk.. ISSS, volume 3233 of Lecture Notes in Computer Science, page 296-317. Springer, (2003)Eighth Enterprise Security (ES) Workshop Report.. WETICE, page 179-183. IEEE Computer Society, (2003)Software Security Checklist for the Software Life Cycle., , , and . WETICE, page 243-248. IEEE Computer Society, (2003)WETICE 2005 Tenth Securities Technologies (ST) Workshop Report (Formerly Enterprise Security (ES)).. WETICE, page 135-137. IEEE Computer Society, (2005)Self Port Scanning Tool: Providing a More Secure Computing Environment Through the Use of Proactive Port Scanning., and . WETICE, page 139-143. IEEE Computer Society, (2005)