Showing 1 - 20 results of 382 Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
    Academic Journal

    Authors: McGraw, G.

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 16(6):4-9 Jan, 2018

    Linked Full Text
  5. 5
    Conference

    Source: Proceedings. 41st Design Automation Conference, 2004. Design Automation Conference, 2004. Proceedings. 41st. :753-760 2004

    Relation: 2004 41st Design Automation Conference

  6. 6
    Conference

    Source: Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00) Computer security applications Computer Security Applications, 2000. ACSAC '00. 16th Annual Conference. :257-267 2000

    Relation: Proceedings of Annual Computer Security Applications Conference

  7. 7
    Conference

    Source: Proceedings 13th IEEE International Conference on Automated Software Engineering (Cat. No.98EX239) Automated software engineering Automated Software Engineering, 1998. Proceedings. 13th IEEE International Conference on. :136-146 1998

    Relation: Proceedings 13th IEEE International Conference on Automated Software Engineering

  8. 8
    Conference

    Source: Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186) Security and privacy Security and Privacy, 1998. Proceedings. 1998 IEEE Symposium on. :104-114 1998

    Relation: Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186)

  9. 9
    Conference

    Source: Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96 Computer assurance Computer Assurance, 1996. COMPASS '96, Systems Integrity. Software Safety. Process Security. Proceedings of the Eleventh Annual Conference on. :250-263 1996

    Relation: Proceedings of 11th Annual Conference on Computer Assurance. COMPASS '96

  10. 10
    Academic Journal

    Authors: McGraw, G.

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 4(5):11-14 Jan, 2006

    Linked Full Text
  11. 11
    Academic Journal

    Authors: McGraw, G.

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 4(4):10-13 Aug, 2006

    Linked Full Text
  12. 12
    Academic Journal

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 4(1):80-83 Jan, 2006

    Linked Full Text
  13. 13
    Academic Journal
  14. 14
    Academic Journal

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 3(5):75-79 Jan, 2005

  15. 15
    Academic Journal

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 3(4):75-79 Aug, 2005

  16. 16
    Academic Journal

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 3(3):88-91 Jun, 2005

  17. 17
    Academic Journal

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 3(2):74-78 Apr, 2005

  18. 18
    Academic Journal

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 3(1):84-87 Jan, 2005

    Linked Full Text
  19. 19
    Academic Journal

    Authors: McGraw, G.

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 11(3):8-10 Jun, 2013

    Linked Full Text
  20. 20
    Academic Journal

    Authors: Chess, B., McGraw, G.

    Source: IEEE Security & Privacy IEEE Secur. Privacy Security & Privacy, IEEE. 2(6):76-79 Jan, 2004