![]() | ![]() |
2005 | ||
---|---|---|
3 | EE | Richard A. Smith: Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. ISI 2005: 652-653 |
1984 | ||
2 | EE | Richard A. Smith, Leslie Chalmers, Charles C. Wood: Security and audit: Needs of the business sector for security and integrity controls. ACM Conference on Computer Science 1984: 246 |
1 | EE | Richard A. Smith: Security design considerations of hardware. ACM Conference on Computer Science 1984: 253-254 |
1 | Leslie Chalmers | [2] |
2 | Charles C. Wood | [2] |