2009 |
11 | EE | Gwendolyn H. Walton,
Thomas A. Longstaff,
Richard C. Linger:
Computational Evaluation of Software Security Attributes.
HICSS 2009: 1-10 |
2004 |
10 | EE | Li-Chiou Chen,
Thomas A. Longstaff,
Kathleen M. Carley:
Characterization of defense mechanisms against distributed denial of service attacks.
Computers & Security 23(8): 665-678 (2004) |
2002 |
9 | | Thomas A. Longstaff,
Yacov Y. Haimes:
A holistic roadmap for survivable infrastructure systems.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 32(2): 260-268 (2002) |
2000 |
8 | EE | Sanjay K. Jha,
Jeannette M. Wing,
Richard C. Linger,
Thomas A. Longstaff:
Survivability Analysis of Network Specifications.
DSN 2000: 613-622 |
7 | EE | Thomas A. Longstaff,
Clyde Chittister,
Rich Pethia,
Yacov Y. Haimes:
Are We Forgetting the Risks of Information Technology?
IEEE Computer 33(12): 43-51 (2000) |
1999 |
6 | | Robert J. Ellison,
David A. Fisher,
Richard C. Linger,
Howard F. Lipson,
Thomas A. Longstaff,
Nancy R. Mead:
Survivability: Protecting Your Critical Systems.
IEEE Internet Computing 3(6): 55-63 (1999) |
5 | EE | Robert J. Ellison,
Richard C. Linger,
Thomas A. Longstaff,
Nancy R. Mead:
Survivable Network System Analysis: A Case Study.
IEEE Software 16(4): 70-77 (1999) |
1998 |
4 | EE | Rick Kazman,
Mark H. Klein,
Mario Barbacci,
Thomas A. Longstaff,
Howard F. Lipson,
S. Jeromy Carrière:
The Architecture Tradeoff Analysis Method.
ICECCS 1998: 68-78 |
3 | EE | Robert J. Ellison,
Richard C. Linger,
Thomas A. Longstaff,
Nancy R. Mead:
Case Study in Survivable Network System Analysis
CoRR cs.SE/9811011: (1998) |
1996 |
2 | EE | Stephanie Forrest,
Steven A. Hofmeyr,
Anil Somayaji,
Thomas A. Longstaff:
A Sense of Self for Unix Processes.
IEEE Symposium on Security and Privacy 1996: 120-128 |
1993 |
1 | EE | Thomas A. Longstaff,
E. Eugene Schultz:
Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code.
Computers & Security 12(1): 61-77 (1993) |