dblp.uni-trier.dewww.uni-trier.de

John D. Powell

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
9EEDavid P. Gilliam, John D. Powell, Matt Bishop, Chris Andrew, Sameer Jog: Security Verification Techniques Applied to PatchLink COTS Software. WETICE 2006: 319-325
2005
8EEDavid P. Gilliam, John D. Powell, Matt Bishop: Application of Lightweight Formal Methods to Software Security. WETICE 2005: 160-165
2004
7 John D. Powell: Determining Defect Trends and Identifying Critical Discriminators: A Case Study. IEEE METRICS 2004
2003
6EEDavid P. Gilliam, John D. Powell, Eric Haugh, Matt Bishop: Addressing Software Security and Mitigations in the Life Cycle. SEW 2003: 201
2002
5EEDavid P. Gilliam, John D. Powell: Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk. WETICE 2002: 153-160
2001
4 Tim Menzies, John D. Powell, Michael E. Houle: Fast Formal Analysis of Requirements via "Topoi Diagrams". ICSE 2001: 391-400
3EEDavid P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop: Development of a Software Security Assessment Instrument to Reduce Software Security Risk. WETICE 2001: 144-149
2000
2EEKen Abernethy, John C. Kelly, Ann E. Kelley Sobel, James D. Kiper, John D. Powell: Technology Transfer Issues for Formal Methods of Software Specification. CSEE&T 2000: 23-31
1EETim Menzies, Bojan Cukic, Harshinder Singh, John D. Powell: Testing Nondeterminate Systems. ISSRE 2000: 222-233

Coauthor Index

1Ken Abernethy [2]
2Chris Andrew [9]
3Matt Bishop [3] [6] [8] [9]
4Bojan Cukic [1]
5David P. Gilliam [3] [5] [6] [8] [9]
6Eric Haugh [6]
7Michael E. Houle [4]
8Sameer Jog [9]
9John C. Kelly [2] [3]
10James D. Kiper [2]
11Tim Menzies [1] [4]
12Harshinder Singh [1]
13Ann E. Kelley Sobel [2]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)