| 2006 |
| 9 | EE | David P. Gilliam,
John D. Powell,
Matt Bishop,
Chris Andrew,
Sameer Jog:
Security Verification Techniques Applied to PatchLink COTS Software.
WETICE 2006: 319-325 |
| 2005 |
| 8 | EE | David P. Gilliam,
John D. Powell,
Matt Bishop:
Application of Lightweight Formal Methods to Software Security.
WETICE 2005: 160-165 |
| 2004 |
| 7 | | John D. Powell:
Determining Defect Trends and Identifying Critical Discriminators: A Case Study.
IEEE METRICS 2004 |
| 2003 |
| 6 | EE | David P. Gilliam,
John D. Powell,
Eric Haugh,
Matt Bishop:
Addressing Software Security and Mitigations in the Life Cycle.
SEW 2003: 201 |
| 2002 |
| 5 | EE | David P. Gilliam,
John D. Powell:
Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk.
WETICE 2002: 153-160 |
| 2001 |
| 4 | | Tim Menzies,
John D. Powell,
Michael E. Houle:
Fast Formal Analysis of Requirements via "Topoi Diagrams".
ICSE 2001: 391-400 |
| 3 | EE | David P. Gilliam,
John C. Kelly,
John D. Powell,
Matt Bishop:
Development of a Software Security Assessment Instrument to Reduce Software Security Risk.
WETICE 2001: 144-149 |
| 2000 |
| 2 | EE | Ken Abernethy,
John C. Kelly,
Ann E. Kelley Sobel,
James D. Kiper,
John D. Powell:
Technology Transfer Issues for Formal Methods of Software Specification.
CSEE&T 2000: 23-31 |
| 1 | EE | Tim Menzies,
Bojan Cukic,
Harshinder Singh,
John D. Powell:
Testing Nondeterminate Systems.
ISSRE 2000: 222-233 |