2006 |
14 | EE | Joon S. Park,
Gautam Jayaprakash,
Joseph Giordano:
Component Integrity Check and Recovery Against Malicious Codes.
AINA (2) 2006: 466-470 |
13 | EE | Joon S. Park,
Joseph Giordano:
Role-based profile analysis for scalable and accurate insider-anomaly detection.
IPCCC 2006 |
12 | EE | Joon S. Park,
Joseph Giordano:
Access Control Requirements for Preventing Insider Threats.
ISI 2006: 529-534 |
11 | EE | Brajendra Panda,
Joseph Giordano,
Daniel Kalil:
Introduction.
Commun. ACM 49(2): 44-47 (2006) |
2005 |
10 | | Joon S. Park,
Pratheep Chandramohan,
Ganesh Devarajan,
Joseph Giordano:
Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems.
SEC 2005: 127-142 |
2004 |
9 | | Joon S. Park,
Pratheep Chandramohan,
Joseph Giordano:
Component-abnormality detection and immunization for survivable systems in large distributed environments.
IASTED Conf. on Software Engineering and Applications 2004: 102-108 |
2002 |
8 | EE | Joseph Giordano,
Chester Maciag:
Cyber Forensics: A Military Operations Perspective.
IJDE 1(2): (2002) |
2001 |
7 | EE | Victor A. Skormin,
José G. Delgado-Frias,
Dennis L. McGee,
Joseph Giordano,
Leonard J. Popyack,
Vladimir I. Gorodetski,
Alexander O. Tarakanov:
BASIS: A Biological Approach to System Information Security.
MMM-ACNS 2001: 127-142 |
6 | EE | Nong Ye,
Joseph Giordano,
John Feldman:
A process control approach to cyber attack detection.
Commun. ACM 44(8): 76-82 (2001) |
1999 |
5 | EE | Brajendra Panda,
Joseph Giordano:
Defensive Information Warfare - Introduction.
Commun. ACM 42(7): 30-32 (1999) |
1998 |
4 | | Brajendra Panda,
Joseph Giordano:
Reconstructing the Database after Electronic Attacks.
DBSec 1998: 143-156 |
3 | EE | Brajendra Panda,
Joseph Giordano:
An overview of post information warfare data recovery.
SAC 1998: 253-254 |
1996 |
2 | EE | Shiu-Kai Chin,
John Faust,
Joseph Giordano:
Formal Methods Applied to Secure Network Engineering.
ICECCS 1996: 344-351 |
1995 |
1 | EE | Shiu-Kai Chin,
John Faust,
Joseph Giordano:
Integrating formal methods tools to support system design.
ICECCS 1995: 88- |