The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

An Introduction to Proving the Correctness of Programs

Sidney L. Hantler,James C. King
Added 2002-07-26

Weak Mutation Testing and Completeness

William E. Howden
Added 2002-07-26

Reliability of the Path Analysis Testing Strategy

William E. Howden
Added 2002-07-26

Toward a Theory of Test Data Selection

John B. Goodenough,Susan L Gerhart
Added 2002-07-26

Social Processes and Proofs of Theorems and Programs

Richard A. De Millo,Richard J. Lipton,Alan J. Perlis
Added 2002-07-26

A Network Security Monitor

L. Todd Heberlein,Gihan V. Dias,Karl N. Levitt,Biswanath Mukherjee,Jeff Wood,David Wolber
Added 2002-07-26

Network Auditing: Issues and Recommendations

Samuel I. Schaen,Brian W. McKenney
Added 2002-07-26

IDES: A Progress Report

Teresa F. Lunt,Ann Tamaru,Fred Gilham,R. Jagannathan,Peter G. Neumann,Caveh Jalali
Added 2002-07-26

Computer Ethics

J. Thomas McEwen
Added 2002-07-26

Coping with Computer Viruses and Related Problems

Steve R. White,David M. Chess,Chengi Jimmy Kuo
Added 2002-07-26


Computer Securtity Threat Monitoring and Surveillance

James P. Anderson Co.
Added 2002-07-26

A Survey of Program Slicing Techniques

F. Tip
Added 2002-07-26

Access Control: Principles and Practice

Ravi S. Sandhu,Pierangela Samarati
Added 2002-07-26

LAFS: A Logging and Auditing File System

Christopher Wee
Added 2002-07-26