M. Kang, J. Park, and J. Froscher. SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, page 66--74. New York, NY, USA, ACM Press, (2001)
S. Goel, and S. Bush. Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing
Networks 2003, Santa Fe Institute, Santa Fe, NM, (November 2003)
S. Bush. Invited Paper: SFI Workshop: Resilient and Adaptive Defense of Computing
Networks 2003, Complexity and Inference, DIMACS Center, Rutgers University, Piscataway, NJ, (June 2003)
V. Atluri, and J. Warner. SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, page 49--58. New York, NY, USA, ACM Press, (2005)
J. Newsome, E. Shi, D. Song, and A. Perrig. Information Processing in Sensor Networks, 2004. IPSN 2004. Third
International Symposium on, page 259--268. (2004)
D. Arora, N. Jha, S. Ravi, and A. Raghunathan. Design Automation Conference, (2005)Could this soultion suggest us some interesting<br/>approach to DPM monitoring techniques?.
C. Haley, R. Laney, and B. Nuseibeh. AOSD '04: Proceedings of the 3rd international conference on Aspect-oriented software development, page 112--121. New York, NY, USA, ACM Press, (2004)
J. Jurjens. ASE '06: Proceedings of the 21st IEEE International Conference on Automated Software Engineering (ASE'06), page 167--176. Washington, DC, USA, IEEE Computer Society, (2006)
H. Mouratidis, P. Giorgini, and G. Manson. Proceedings of the second international joint conference on Autonomous agents and multiagent systems, (2003)
K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Knowledge Engineering and Knowledge Management. Methods, Models, and Tools., volume 1937 of LNAI, page 352-365. Heidelberg, Springer, (2000)
K. Becker, G. Stumme, R. Wille, U. Wille, and M. Zickwolff. Knowledge Engineering and Knowledge Management. Methods, Models, and Tools., volume 1937 of LNAI, page 352-365. Heidelberg, Springer, (2000)
C. Haley, J. Moffett, R. Laney, and B. Nuseibeh. Third Symposium on Requirements Engineering for Information Security (SREIS'05) held in conjunction with the 13th International Requirements Engineering Conference (RE'05), Paris, (August 2005)