Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Joseph Giordano
@article{DBLP:journals/tjs/ParkCSGK13, author = {Joon S. Park and Pratheep Chandramohan and Avinash T. Suresh and Joseph Giordano and Kevin A. Kwiat}, title = {Component survivability at runtime for mission-critical distributed systems}, journal = {J. Supercomput.}, volume = {66}, number = {3}, pages = {1390--1417}, year = {2013}, url = {https://doi.org/10.1007/s11227-012-0818-2}, doi = {10.1007/S11227-012-0818-2}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ParkCSGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PandaGK06, author = {Brajendra Panda and Joseph Giordano and Daniel Kalil}, title = {Introduction}, journal = {Commun. {ACM}}, volume = {49}, number = {2}, pages = {44--47}, year = {2006}, url = {https://doi.org/10.1145/1113034.1113067}, doi = {10.1145/1113034.1113067}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PandaGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ParkJG06, author = {Joon S. Park and Gautam Jayaprakash and Joseph Giordano}, title = {Component Integrity Check and Recovery Against Malicious Codes}, booktitle = {20th International Conference on Advanced Information Networking and Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria}, pages = {466--470}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AINA.2006.131}, doi = {10.1109/AINA.2006.131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ParkJG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ParkSAG06, author = {Joon S. Park and Avinash T. Suresh and Gaeil An and Joseph Giordano}, editor = {Enrico Blanzieri and Tao Zhang}, title = {A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration in Mission-Critical Systems}, booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA, November 17-20, 2006}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2006}, url = {https://doi.org/10.1109/COLCOM.2006.361878}, doi = {10.1109/COLCOM.2006.361878}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ParkSAG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/ParkG06, author = {Joon S. Park and Joseph Giordano}, title = {Role-based profile analysis for scalable and accurate insider-anomaly detection}, booktitle = {Proceedings of the 25th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2006, April 10-12, 2006, Phoenix, Arizona, {USA}}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/.2006.1629440}, doi = {10.1109/.2006.1629440}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/ParkG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ParkG06, author = {Joon S. Park and Joseph Giordano}, editor = {Sharad Mehrotra and Daniel Dajun Zeng and Hsinchun Chen and Bhavani Thuraisingham and Fei{-}Yue Wang}, title = {Access Control Requirements for Preventing Insider Threats}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3975}, pages = {529--534}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760146\_52}, doi = {10.1007/11760146\_52}, timestamp = {Wed, 29 Jun 2022 15:37:43 +0200}, biburl = {https://dblp.org/rec/conf/isi/ParkG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ParkCDG05, author = {Joon S. Park and Pratheep Chandramohan and Ganesh Devarajan and Joseph Giordano}, editor = {Ry{\^{o}}ichi Sasaki and Sihan Qing and Eiji Okamoto and Hiroshi Yoshiura}, title = {Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems}, booktitle = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11} 20th International Conference on Information Security {(SEC} 2005), May 30 - June 1, 2005, Chiba, Japan}, series = {{IFIP}}, volume = {181}, pages = {127--142}, publisher = {Springer}, year = {2005}, timestamp = {Fri, 19 May 2017 01:25:10 +0200}, biburl = {https://dblp.org/rec/conf/sec/ParkCDG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iastedSEA/ParkCG04, author = {Joon S. Park and Pratheep Chandramohan and Joseph Giordano}, editor = {M. H. Hamza}, title = {Component-abnormality detection and immunization for survivable systems in large distributed environments}, booktitle = {Proceedings of the {IASTED} Conference on Software Engineering and Applications, November 9-11, 2004, MIT, Cambridge, MA, {USA}}, pages = {102--108}, publisher = {{IASTED/ACTA} Press}, year = {2004}, timestamp = {Mon, 18 Jun 2007 14:30:27 +0200}, biburl = {https://dblp.org/rec/conf/iastedSEA/ParkCG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/GiordanoM02, author = {Joseph Giordano and Chester Maciag}, title = {Cyber Forensics: {A} Military Operations Perspective}, journal = {Int. J. Digit. EVid.}, volume = {1}, number = {2}, year = {2002}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A04843F3-99E5-632B-FF420389C0633B1B.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/GiordanoM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/YeGF01, author = {Nong Ye and Joseph Giordano and John Feldman}, title = {A process control approach to cyber attack detection}, journal = {Commun. {ACM}}, volume = {44}, number = {8}, pages = {76--82}, year = {2001}, url = {https://doi.org/10.1145/381641.381662}, doi = {10.1145/381641.381662}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/YeGF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SkorminDMGPGT01, author = {Victor A. Skormin and Jos{\'{e}} G. Delgado{-}Frias and Dennis L. McGee and Joseph Giordano and Leonard J. Popyack and Vladimir I. Gorodetski and Alexander O. Tarakanov}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {{BASIS:} {A} Biological Approach to System Information Security}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {127--142}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_15}, doi = {10.1007/3-540-45116-1\_15}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SkorminDMGPGT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PandaG99, author = {Brajendra Panda and Joseph Giordano}, title = {Defensive Information Warfare - Introduction}, journal = {Commun. {ACM}}, volume = {42}, number = {7}, pages = {30--32}, year = {1999}, url = {https://doi.org/10.1145/306549.306559}, doi = {10.1145/306549.306559}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PandaG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/PandaG98, author = {Brajendra Panda and Joseph Giordano}, editor = {Sushil Jajodia}, title = {Reconstructing the Database after Electronic Attacks}, booktitle = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG} 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece}, series = {{IFIP} Conference Proceedings}, volume = {142}, pages = {143--156}, publisher = {Kluwer}, year = {1998}, timestamp = {Mon, 21 Oct 2002 13:30:47 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/PandaG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/PandaG98, author = {Brajendra Panda and Joseph Giordano}, editor = {K. M. George and Gary B. Lamont}, title = {An overview of post information warfare data recovery}, booktitle = {Proceedings of the 1998 {ACM} symposium on Applied Computing, SAC'98, Atlanta, GA, USA, February 27 - March 1, 1998}, pages = {253--254}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/330560.330696}, doi = {10.1145/330560.330696}, timestamp = {Tue, 06 Nov 2018 11:06:46 +0100}, biburl = {https://dblp.org/rec/conf/sac/PandaG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/ChinFG96, author = {Shiu{-}Kai Chin and John Faust and Joseph Giordano}, title = {Formal Methods Applied to Secure Network Engineering}, booktitle = {2nd {IEEE} International Conference on Engineering of Complex Computer Systems {(ICECCS} '96), 21-25 October 1996, Montreal, Canada}, pages = {344--351}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/ICECCS.1996.558435}, doi = {10.1109/ICECCS.1996.558435}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/ChinFG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/ChinFG95, author = {Shiu{-}Kai Chin and John Faust and Joseph Giordano}, title = {Integrating formal methods tools to support system design}, booktitle = {1st {IEEE} International Conference on Engineering of Complex Computer Systems {(ICECCS} '95), November 6-10, 1995, Fort Lauderdale, Florida, {USA}}, pages = {88}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/ICECCS.1995.479310}, doi = {10.1109/ICECCS.1995.479310}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/ChinFG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.