1998 |
8 | EE | Edward Amoroso,
R. Kwapniewski:
Selection Criteria for Intrusion Detection Systems.
ACSAC 1998: 280- |
7 | | Edward Amoroso,
Eugene Kogan,
Brenda McAnderson,
Dan Powell,
Brian Rexroad,
Steve Schuster,
Anthony Stramaglia:
Local Area Detection of Incoming War Dial Activity.
SRDS 1998: 486-491 |
1996 |
6 | | Edward Amoroso,
Matt Bishop:
Secruity Enables Electronic Commerce.
J. Network Syst. Manage. 4(3): (1996) |
1994 |
5 | EE | Edward Amoroso,
Carol Taylor,
John Watson,
Jonathan Weiss:
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
ACM Conference on Computer and Communications Security 1994: 39-50 |
1993 |
4 | EE | Edward Amoroso:
A graduate course in computing security technology.
SIGCSE 1993: 251-255 |
3 | EE | Marshall D. Abrams,
Edward Amoroso,
Leonard J. LaPadula,
Teresa F. Lunt,
James G. Williams:
Report of an integrity research study group.
Computers & Security 12(7): 679-689 (1993) |
1991 |
2 | | Edward Amoroso,
T. Nguyen,
Jonathan Weiss,
John Watson,
P. Lapiska,
T. Starr:
Toward an Approach to Measuring Software Trust.
IEEE Symposium on Security and Privacy 1991: 198-218 |
1990 |
1 | | Edward Amoroso:
A Policy Model for Denial of Service.
CSFW 1990: 110-114 |