SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
Applying formal methods to semantic-based decomposition of transactions
ACM Transactions on Database Systems (TODS)
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Fault Tolerance: Principles and Practice
Fault Tolerance: Principles and Practice
Surviving information warfare attacks on databases
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Discussion: strike back: offensive actions in information warfare
Proceedings of the 1999 workshop on New security paradigms
Data dependency based logging for defensive information warfare
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 1
Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace
ACM SIGCAS Computers and Society
Reorganization of the database log for information warfare data recovery
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Integrating cooperative engagement capability into network-centric information system security
Current security management & Ethical issues of information technology
Hybrid log segmentation for assured damage assessment
Proceedings of the 2003 ACM symposium on Applied computing
Transaction fusion: a model for data recovery from information attacks
Journal of Intelligent Information Systems - Special issue: Database and applications security
A forensic approach to incident response
2010 Information Security Curriculum Development Conference
A time-variant risk analysis and damage estimation for large-scale network systems
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Succinct and fast accessible data structures for database damage assessment
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Incident-centered information security: Managing a strategic balance between prevention and response
Information and Management
Component survivability at runtime for mission-critical distributed systems
The Journal of Supercomputing
Hi-index | 48.24 |