2003 | ||
---|---|---|
3 | EE | Jesper M. Johansson: Network Threat Modeling. WETICE 2003: 10 |
2 | Jesper M. Johansson, E. Eugene Schultz: Dealing with contextual vulnerabilities in code: distinguishing between solutions and pseudosolutions. Computers & Security 22(2): 152-159 (2003) | |
2000 | ||
1 | EE | Jesper M. Johansson, Salvatore T. March, J. David Naumann: The effects of parallel processing on update response time in distributed database design. ICIS 2000: 187-196 |
1 | Salvatore T. March | [1] |
2 | J. David Naumann | [1] |
3 | E. Eugene Schultz | [2] |