BibTeX records: Joseph Giordano

download as .bib file

@article{DBLP:journals/tjs/ParkCSGK13,
  author       = {Joon S. Park and
                  Pratheep Chandramohan and
                  Avinash T. Suresh and
                  Joseph Giordano and
                  Kevin A. Kwiat},
  title        = {Component survivability at runtime for mission-critical distributed
                  systems},
  journal      = {J. Supercomput.},
  volume       = {66},
  number       = {3},
  pages        = {1390--1417},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11227-012-0818-2},
  doi          = {10.1007/S11227-012-0818-2},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ParkCSGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PandaGK06,
  author       = {Brajendra Panda and
                  Joseph Giordano and
                  Daniel Kalil},
  title        = {Introduction},
  journal      = {Commun. {ACM}},
  volume       = {49},
  number       = {2},
  pages        = {44--47},
  year         = {2006},
  url          = {https://doi.org/10.1145/1113034.1113067},
  doi          = {10.1145/1113034.1113067},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PandaGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ParkJG06,
  author       = {Joon S. Park and
                  Gautam Jayaprakash and
                  Joseph Giordano},
  title        = {Component Integrity Check and Recovery Against Malicious Codes},
  booktitle    = {20th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria},
  pages        = {466--470},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AINA.2006.131},
  doi          = {10.1109/AINA.2006.131},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ParkJG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ParkSAG06,
  author       = {Joon S. Park and
                  Avinash T. Suresh and
                  Gaeil An and
                  Joseph Giordano},
  editor       = {Enrico Blanzieri and
                  Tao Zhang},
  title        = {A Framework of Multiple-Aspect Component-Testing for Trusted Collaboration
                  in Mission-Critical Systems},
  booktitle    = {2nd International {ICST} Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
                  November 17-20, 2006},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2006},
  url          = {https://doi.org/10.1109/COLCOM.2006.361878},
  doi          = {10.1109/COLCOM.2006.361878},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ParkSAG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/ParkG06,
  author       = {Joon S. Park and
                  Joseph Giordano},
  title        = {Role-based profile analysis for scalable and accurate insider-anomaly
                  detection},
  booktitle    = {Proceedings of the 25th {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2006, April 10-12, 2006, Phoenix,
                  Arizona, {USA}},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/.2006.1629440},
  doi          = {10.1109/.2006.1629440},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/ParkG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ParkG06,
  author       = {Joon S. Park and
                  Joseph Giordano},
  editor       = {Sharad Mehrotra and
                  Daniel Dajun Zeng and
                  Hsinchun Chen and
                  Bhavani Thuraisingham and
                  Fei{-}Yue Wang},
  title        = {Access Control Requirements for Preventing Insider Threats},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA,
                  USA, May 23-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3975},
  pages        = {529--534},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760146\_52},
  doi          = {10.1007/11760146\_52},
  timestamp    = {Wed, 29 Jun 2022 15:37:43 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ParkG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ParkCDG05,
  author       = {Joon S. Park and
                  Pratheep Chandramohan and
                  Ganesh Devarajan and
                  Joseph Giordano},
  editor       = {Ry{\^{o}}ichi Sasaki and
                  Sihan Qing and
                  Eiji Okamoto and
                  Hiroshi Yoshiura},
  title        = {Trusted Component Sharing by Runtime Test and Immunization for Survivable
                  Distributed Systems},
  booktitle    = {Security and Privacy in the Age of Ubiquitous Computing, {IFIP} {TC11}
                  20th International Conference on Information Security {(SEC} 2005),
                  May 30 - June 1, 2005, Chiba, Japan},
  series       = {{IFIP}},
  volume       = {181},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Fri, 19 May 2017 01:25:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ParkCDG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iastedSEA/ParkCG04,
  author       = {Joon S. Park and
                  Pratheep Chandramohan and
                  Joseph Giordano},
  editor       = {M. H. Hamza},
  title        = {Component-abnormality detection and immunization for survivable systems
                  in large distributed environments},
  booktitle    = {Proceedings of the {IASTED} Conference on Software Engineering and
                  Applications, November 9-11, 2004, MIT, Cambridge, MA, {USA}},
  pages        = {102--108},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2004},
  timestamp    = {Mon, 18 Jun 2007 14:30:27 +0200},
  biburl       = {https://dblp.org/rec/conf/iastedSEA/ParkCG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijde/GiordanoM02,
  author       = {Joseph Giordano and
                  Chester Maciag},
  title        = {Cyber Forensics: {A} Military Operations Perspective},
  journal      = {Int. J. Digit. EVid.},
  volume       = {1},
  number       = {2},
  year         = {2002},
  url          = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A04843F3-99E5-632B-FF420389C0633B1B.pdf},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijde/GiordanoM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/YeGF01,
  author       = {Nong Ye and
                  Joseph Giordano and
                  John Feldman},
  title        = {A process control approach to cyber attack detection},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {8},
  pages        = {76--82},
  year         = {2001},
  url          = {https://doi.org/10.1145/381641.381662},
  doi          = {10.1145/381641.381662},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/YeGF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SkorminDMGPGT01,
  author       = {Victor A. Skormin and
                  Jos{\'{e}} G. Delgado{-}Frias and
                  Dennis L. McGee and
                  Joseph Giordano and
                  Leonard J. Popyack and
                  Vladimir I. Gorodetski and
                  Alexander O. Tarakanov},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {{BASIS:} {A} Biological Approach to System Information Security},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {127--142},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_15},
  doi          = {10.1007/3-540-45116-1\_15},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SkorminDMGPGT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PandaG99,
  author       = {Brajendra Panda and
                  Joseph Giordano},
  title        = {Defensive Information Warfare - Introduction},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {7},
  pages        = {30--32},
  year         = {1999},
  url          = {https://doi.org/10.1145/306549.306559},
  doi          = {10.1145/306549.306559},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PandaG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/PandaG98,
  author       = {Brajendra Panda and
                  Joseph Giordano},
  editor       = {Sushil Jajodia},
  title        = {Reconstructing the Database after Electronic Attacks},
  booktitle    = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG}
                  11.3 Twelfth International Working Conference on Database Security,
                  July 15-17, 1998, Chalkidiki, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {142},
  pages        = {143--156},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Mon, 21 Oct 2002 13:30:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/PandaG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/PandaG98,
  author       = {Brajendra Panda and
                  Joseph Giordano},
  editor       = {K. M. George and
                  Gary B. Lamont},
  title        = {An overview of post information warfare data recovery},
  booktitle    = {Proceedings of the 1998 {ACM} symposium on Applied Computing, SAC'98,
                  Atlanta, GA, USA, February 27 - March 1, 1998},
  pages        = {253--254},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/330560.330696},
  doi          = {10.1145/330560.330696},
  timestamp    = {Tue, 06 Nov 2018 11:06:46 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/PandaG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/ChinFG96,
  author       = {Shiu{-}Kai Chin and
                  John Faust and
                  Joseph Giordano},
  title        = {Formal Methods Applied to Secure Network Engineering},
  booktitle    = {2nd {IEEE} International Conference on Engineering of Complex Computer
                  Systems {(ICECCS} '96), 21-25 October 1996, Montreal, Canada},
  pages        = {344--351},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICECCS.1996.558435},
  doi          = {10.1109/ICECCS.1996.558435},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/ChinFG96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/ChinFG95,
  author       = {Shiu{-}Kai Chin and
                  John Faust and
                  Joseph Giordano},
  title        = {Integrating formal methods tools to support system design},
  booktitle    = {1st {IEEE} International Conference on Engineering of Complex Computer
                  Systems {(ICECCS} '95), November 6-10, 1995, Fort Lauderdale, Florida,
                  {USA}},
  pages        = {88},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/ICECCS.1995.479310},
  doi          = {10.1109/ICECCS.1995.479310},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/ChinFG95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics