REQcollect: Requirements Collection, Project Matching and Technology Transition | 2 | 0.58 | 2014 |
DART3: DHS assistant for R&D tracking and technology transfer | 1 | 0.83 | 2011 |
Why is there no science in cyber science?: a panel discussion at NSPW 2010 | 8 | 0.62 | 2010 |
Barriers to science in security | 5 | 0.48 | 2010 |
Cyber science: moving from the toes to the shoulders of giants | 0 | 0.34 | 2010 |
DOE grass roots panel | 0 | 0.34 | 2009 |
Computational Evaluation of Software Security Attributes | 3 | 0.47 | 2009 |
Characterization of defense mechanisms against distributed denial of service attacks | 15 | 0.90 | 2004 |
The Economic Incentives Of Providing Network Security Services On The Internet Infrastructure. | 0 | 0.34 | 2004 |
A holistic roadmap for survivable infrastructure systems | 6 | 1.17 | 2002 |
Survivability Analysis of Network Specifications | 14 | 3.09 | 2000 |
Are we forgetting the risks of information technology? | 46 | 5.87 | 2000 |
Survivability: Protecting Your Critical Systems | 43 | 6.48 | 1999 |
Survivable network system analysis: a case study | 43 | 5.49 | 1999 |
The architecture tradeoff analysis method | 250 | 21.81 | 1998 |
Case Study in Survivable Network System Analysis | 14 | 2.08 | 1998 |
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code | 11 | 2.87 | 1993 |