Carol Taylor

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

7EECarol Taylor, Rose Shumba: Security education: a roadmap to the future. SIGCSE 2008: 459-460
6EECarrie Gates, Carol Taylor: Challenging the anomaly detection paradigm: a provocative discussion. NSPW 2006: 21-29
5EEJim Alves-Foss, Paul W. Oman, Carol Taylor, Scott Harrison: The MILS architecture for high-assurance embedded systems. IJES 2(3/4): 239-247 (2006)
4EEJim Alves-Foss, Carol Taylor, Paul W. Oman: A Multi-Layered Approach to Security in High Assurance Systems. HICSS 2004
3EECarol Taylor, Jim Alves-Foss: Attack Recognition for System Survivability: A Low-level Approach. HICSS 2003: 335
2 Carol Taylor, Paul W. Oman, Axel W. Krings: Assessing Power Substation Network Security and Survivability: A Work in Progress Report. Security and Management 2003: 281-287
1EEEdward Amoroso, Carol Taylor, John Watson, Jonathan Weiss: A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. ACM Conference on Computer and Communications Security 1994: 39-50

Coauthor Index

1Jim Alves-Foss [3] [4] [5]
2Edward Amoroso [1]
3Carrie Gates [6]
4Scott Harrison [5]
5Axel W. Krings [2]
6Paul W. Oman [2] [4] [5]
7Rose Shumba [7]
8John Watson [1]
9Jonathan Weiss [1]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)