Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems | 0 | 0.34 | 2019 |
Static Termination Analysis for Event-driven Distributed Algorithms | 0 | 0.34 | 2019 |
Mapping CAN-to-ethernet communication channels within virtualized embedded environments | 0 | 0.34 | 2015 |
Security Policy Synthesis in Mobile Systems | 0 | 0.34 | 2015 |
WorSE: A Workbench for Model-based Security Engineering. | 6 | 0.44 | 2014 |
Heuristic safety analysis of access control models | 4 | 0.39 | 2013 |
Model-based safety analysis of SELinux security policies. | 3 | 0.38 | 2011 |
Towards access control model engineering | 4 | 0.39 | 2011 |
Efficient Algorithmic Safety Analysis of HRU Security Models | 1 | 0.36 | 2010 |
Towards a structure-aware failure semantics for streaming media communication models | 1 | 0.37 | 2005 |
Root Kits: an operating systems viewpoint | 4 | 0.64 | 2004 |
Root Kits | 0 | 0.34 | 2003 |
Embedding security policies into a distributed computing environment | 4 | 0.51 | 1999 |
Policy Groups | 1 | 0.36 | 1999 |
A Comment on S. Kang's and H. Lee's paper on ``Analysis and Solution of Non-Preemptive Policies for Scheduling Readers and Writers''. | 0 | 0.34 | 1999 |
Adaptability using reflection | 6 | 0.76 | 1994 |
The BirliX Security Architecture | 16 | 4.50 | 1993 |
Performance of the BirLiX Operating System | 3 | 1.62 | 1992 |
Issues in Security and Fault Tolerance | 0 | 0.34 | 1991 |
The Architecture of the BIRLIX Operating System | 1 | 0.39 | 1990 |
On the Implementation of Abstract Data Types in BirliX | 0 | 0.34 | 1989 |
Distribution and Recovery in the BirliX Operating System | 1 | 0.93 | 1987 |
Distribution in the BirliX Operating System | 0 | 0.34 | 1986 |