2005 |
8 | EE | Herbert H. Thompson:
Application Penetration Testing.
IEEE Security & Privacy 3(1): 66-69 (2005) |
2004 |
7 | EE | Ibrahim K. El-Far,
Chia-Chu Chiang,
Stefan Gruner,
Markus Montigel,
Herbert H. Thompson:
Editorial message: special track on software engineering: applications, practices, and tools.
SAC 2004: 1511-1512 |
6 | EE | Herbert H. Thompson,
Richard Ford:
Perfect Storm: The Insider, Naivety, and Hostility.
ACM Queue 2(4): 58-65 (2004) |
5 | EE | Herbert H. Thompson,
Chia-Chu Chiang,
Ibrahim K. El-Far,
Stefan Gruner,
Markus Montigel,
James A. Whittaker:
Special Issue on Software Engineering: Applications, Practices and Tools from the ACM Symposium on Applied Computing 2003.
Information & Software Technology 46(5): 279-280 (2004) |
2003 |
4 | | Herbert H. Thompson,
Chia-Chu Chiang,
Ibrahim K. El-Far,
Stefan Gruner,
Markus Montigel,
James A. Whittaker:
Software Engineering Track Editorial.
SAC 2003: 1076-1077 |
3 | EE | James A. Whittaker,
Herbert H. Thompson:
Black Box Debugging.
ACM Queue 1(9): 68-74 (2003) |
2 | EE | Herbert H. Thompson:
Why Security Testing Is Hard.
IEEE Security & Privacy 1(4): 83-86 (2003) |
2002 |
1 | EE | Herbert H. Thompson,
James A. Whittaker,
Florence E. Mottay:
Software security vulnerability testing in hostile environments.
SAC 2002: 260-264 |