dblp.uni-trier.dewww.uni-trier.de

Thomas A. Longstaff

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
11EEGwendolyn H. Walton, Thomas A. Longstaff, Richard C. Linger: Computational Evaluation of Software Security Attributes. HICSS 2009: 1-10
2004
10EELi-Chiou Chen, Thomas A. Longstaff, Kathleen M. Carley: Characterization of defense mechanisms against distributed denial of service attacks. Computers & Security 23(8): 665-678 (2004)
2002
9 Thomas A. Longstaff, Yacov Y. Haimes: A holistic roadmap for survivable infrastructure systems. IEEE Transactions on Systems, Man, and Cybernetics, Part A 32(2): 260-268 (2002)
2000
8EESanjay K. Jha, Jeannette M. Wing, Richard C. Linger, Thomas A. Longstaff: Survivability Analysis of Network Specifications. DSN 2000: 613-622
7EEThomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes: Are We Forgetting the Risks of Information Technology? IEEE Computer 33(12): 43-51 (2000)
1999
6 Robert J. Ellison, David A. Fisher, Richard C. Linger, Howard F. Lipson, Thomas A. Longstaff, Nancy R. Mead: Survivability: Protecting Your Critical Systems. IEEE Internet Computing 3(6): 55-63 (1999)
5EERobert J. Ellison, Richard C. Linger, Thomas A. Longstaff, Nancy R. Mead: Survivable Network System Analysis: A Case Study. IEEE Software 16(4): 70-77 (1999)
1998
4EERick Kazman, Mark H. Klein, Mario Barbacci, Thomas A. Longstaff, Howard F. Lipson, S. Jeromy Carrière: The Architecture Tradeoff Analysis Method. ICECCS 1998: 68-78
3EERobert J. Ellison, Richard C. Linger, Thomas A. Longstaff, Nancy R. Mead: Case Study in Survivable Network System Analysis CoRR cs.SE/9811011: (1998)
1996
2EEStephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff: A Sense of Self for Unix Processes. IEEE Symposium on Security and Privacy 1996: 120-128
1993
1EEThomas A. Longstaff, E. Eugene Schultz: Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. Computers & Security 12(1): 61-77 (1993)

Coauthor Index

1Mario Barbacci [4]
2Kathleen M. Carley [10]
3S. Jeromy Carrière [4]
4Li-Chiou Chen [10]
5Clyde Chittister [7]
6Robert J. Ellison [3] [5] [6]
7David A. Fisher [6]
8Stephanie Forrest [2]
9Yacov Y. Haimes [7] [9]
10Steven A. Hofmeyr [2]
11Sanjay K. Jha [8]
12Rick Kazman [4]
13Mark H. Klein [4]
14Richard C. Linger [3] [5] [6] [8] [11]
15Howard F. Lipson [4] [6]
16Nancy R. Mead [3] [5] [6]
17Rich Pethia [7]
18E. Eugene Schultz [1]
19Anil Somayaji [2]
20Gwendolyn H. Walton [11]
21Jeannette M. Wing [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)