Author of the publication

Training Security Assurance Teams Using Vulnerability Injection.

, , and . PRDC, page 297-304. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Minimal System for the Study of Relationships between Brain Processes and Psychological Events., , , , , , and . EUROCAST, volume 410 of Lecture Notes in Computer Science, page 253-266. Springer, (1989)Visual Information Processing from the Viewpoint of Symbolic Operations., , and . IWANN, volume 930 of Lecture Notes in Computer Science, page 260-267. Springer, (1995)The Chemical Metaphor in Neural Computation., , , and . IWANN (1), volume 2084 of Lecture Notes in Computer Science, page 184-195. Springer, (2001)Cognitive Processes in Social Interaction - A Neural Networks Approach., , and . IWANN, volume 1240 of Lecture Notes in Computer Science, page 660-667. Springer, (1997)Dentritic Computation in the Brain., , and . IWANN, volume 930 of Lecture Notes in Computer Science, page 268-275. Springer, (1995)Vision-An Essay from a Computational View Point., , and . EUROCAST, volume 5717 of Lecture Notes in Computer Science, page 143-151. Springer, (2009)Interference Detection in Architectural Databases., , , , , and . Eurographics (Short Presentations), Eurographics Association, (1999)Integrated Intrusion Detection in Databases., , and . LADC, volume 4746 of Lecture Notes in Computer Science, page 198-211. Springer, (2007)Training Security Assurance Teams Using Vulnerability Injection., , and . PRDC, page 297-304. IEEE Computer Society, (2008)Mapping software faults with web security vulnerabilities., and . DSN, page 257-266. IEEE Computer Society, (2008)