Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Building Diverse Computer Systems
HOTOS '97 Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI)
Analysis of a Denial of Service Attack on TCP
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Is the Reference Monitor Concept Fatally Flawed? The Case for the Negative
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Is the Trusted Computing Base Concept Fundamentally Flawed?
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Some weaknesses of the TCB model
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
StackGuard: automatic adaptive detection and prevention of buffer-overflow attacks
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
An open-source cryptographic coprocessor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Torbit: Design of an open source security flaw measurement suite
Journal of Computational Methods in Sciences and Engineering
International Journal of Automation and Computing
On random-inspection-based intrusion detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Hi-index | 0.00 |