The Center for Education and Research in Information Assurance and Security (CERIAS)
The Center for Education and Research in
Information Assurance and Security (CERIAS)
Menu
Search CERIAS
Go
HOME
(current)
ABOUT
About CERIAS
Public Relations Materials & Info
Travel Information
Frequently Asked Questions
Organizational Primer (PDF)
History
PEOPLE
Faculty & Research Staff
Student List
Staff
PhD Graduates
Awards
All People
PARTNERS
Strategic Partners
External Advisory Board
Donors
Purdue Campus Partners
All Partners
SEMINARS
NEWS & BLOGS
RESEARCH
EDUCATION
RESOURCES
STUDENTS
SYMPOSIUM
Search CERIAS
Go
Home
>
Reports and Papers Archive
>
Reports and Papers Archive
Search:
Type:
Type
article
book
booklet
collection
conference
inbook
incollection
inproceedings
manual
mastersthesis
misc
patent
phdthesis
proceedings
techreport
unpublished
Browse All Papers »
Submit A Paper »
‹ First
<
191
192
193
194
195
>
Last ›
An Introduction to Proving the Correctness of Programs
Sidney L. Hantler,James C. King
Added 2002-07-26
Weak Mutation Testing and Completeness
William E. Howden
Added 2002-07-26
Reliability of the Path Analysis Testing Strategy
William E. Howden
Added 2002-07-26
Toward a Theory of Test Data Selection
John B. Goodenough,Susan L Gerhart
Added 2002-07-26
Social Processes and Proofs of Theorems and Programs
Richard A. De Millo,Richard J. Lipton,Alan J. Perlis
Added 2002-07-26
A Network Security Monitor
L. Todd Heberlein,Gihan V. Dias,Karl N. Levitt,Biswanath Mukherjee,Jeff Wood,David Wolber
Added 2002-07-26
Network Auditing: Issues and Recommendations
Samuel I. Schaen,Brian W. McKenney
Added 2002-07-26
IDES: A Progress Report
Teresa F. Lunt,Ann Tamaru,Fred Gilham,R. Jagannathan,Peter G. Neumann,Caveh Jalali
Added 2002-07-26
Computer Ethics
J. Thomas McEwen
Added 2002-07-26
Coping with Computer Viruses and Related Problems
Steve R. White,David M. Chess,Chengi Jimmy Kuo
Added 2002-07-26
On Hierarchical Design of Computer Systems for Critical Applications
Peter Gabriel Neumann
Added 2002-07-26
Computer Securtity Threat Monitoring and Surveillance
James P. Anderson Co.
Added 2002-07-26
A Survey of Program Slicing Techniques
F. Tip
Added 2002-07-26
Access Control: Principles and Practice
Ravi S. Sandhu,Pierangela Samarati
Added 2002-07-26
LAFS: A Logging and Auditing File System
Christopher Wee
Added 2002-07-26
‹ First
<
191
192
193
194
195
>
Last ›