2006 |
9 | EE | David P. Gilliam,
John D. Powell,
Matt Bishop,
Chris Andrew,
Sameer Jog:
Security Verification Techniques Applied to PatchLink COTS Software.
WETICE 2006: 319-325 |
2005 |
8 | EE | David P. Gilliam,
John D. Powell,
Matt Bishop:
Application of Lightweight Formal Methods to Software Security.
WETICE 2005: 160-165 |
2004 |
7 | | John D. Powell:
Determining Defect Trends and Identifying Critical Discriminators: A Case Study.
IEEE METRICS 2004 |
2003 |
6 | EE | David P. Gilliam,
John D. Powell,
Eric Haugh,
Matt Bishop:
Addressing Software Security and Mitigations in the Life Cycle.
SEW 2003: 201 |
2002 |
5 | EE | David P. Gilliam,
John D. Powell:
Integrating a Flexible Modeling Framework (FMF) with the Network Security Assessment Instrument to Reduce Software Security Risk.
WETICE 2002: 153-160 |
2001 |
4 | | Tim Menzies,
John D. Powell,
Michael E. Houle:
Fast Formal Analysis of Requirements via "Topoi Diagrams".
ICSE 2001: 391-400 |
3 | EE | David P. Gilliam,
John C. Kelly,
John D. Powell,
Matt Bishop:
Development of a Software Security Assessment Instrument to Reduce Software Security Risk.
WETICE 2001: 144-149 |
2000 |
2 | EE | Ken Abernethy,
John C. Kelly,
Ann E. Kelley Sobel,
James D. Kiper,
John D. Powell:
Technology Transfer Issues for Formal Methods of Software Specification.
CSEE&T 2000: 23-31 |
1 | EE | Tim Menzies,
Bojan Cukic,
Harshinder Singh,
John D. Powell:
Testing Nondeterminate Systems.
ISSRE 2000: 222-233 |