Improving Network System Security with Function Extraction Technology for Automated Calculation of Program Behavior (2004)

Cached

Download Links

by Mark G. Pleszkoch , Richard C. Linger
Venue:In Proceedings of the 37th Annual Hawaii International Conference on System Sciences. IEEE
Citations:17 - 10 self

Documents Related by Co-Citation

13 The Impact of Function Extraction Technology on Next-Generation Software Engineering – A Hevner, R Linger, R Collins, M Pleszkoch, S Prowell, G Walton - 2005
9 The cert function extraction experiment: Quantifying fx impact on software comprehension and verification – Rosann W Collins, Gwendolyn H Walton, Alan R Hevner, Richard C Linger - 2005
8 Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior – Richard C. Linger, Mark G. Pleszkoch, Luanne Burns, Alan R. Hevner, Gwendolyn H. Walton
15 Function-Theoretic Principles of Program Understanding – M Pleszkoch, P Hausler, A Hevner, R Linger - 1990
50 Witt: Structured programming: Theory and Practice – R C Linger, H D Mills, B I - 1979
27 A.R.: Using function abstraction to understand program behavior – P A Hausler, M G Pleszkoch, R C Linger, Hevner - 1990
11 Cleanroom software engineering: technology and process – S Prowell - 1999
3 Technology Foundations for Computational Evaluation of Security Attributes – G Walton, T Longstaff, R Linger - 2006
13 The Flow-ServiceQuality Framework: Unified Engineering for Large-Scale, Adaptive Systems – Alan Hevner, Ann Sobel, Richard Linger, Gwendolyn Walton - 2002
3 Tamper detection marking for object files – Mike Jochen, Lori L. Pollock - 2003
3 Reliable and dynamic access to service in battlefield ad hoc networks – M A Fecko, U C Kozat, S Samtani, M Ümit Uyar, I Höklek - 2004
6 A Framework for Tamper Detection Marking of Mobile Applications – Mike Jochen, Lisa M. Marvel, Lori L. Pollock - 2003
19 Classification of Malicious Host Threats in Mobile Agent Computing – E Bierman, E Cloete - 2002
43 Efficient Instrumentation for Code Coverage Testing – Mustafa M. Tikir, Jeffrey K. Hollingsworth - 2002
36 Security in the Ajanta Mobile Agent System – Neeran Karnik, Anand R. Tripathi - 1999
51 Online Feedback-Directed Optimization of Java – Matthew Arnold, Michael Hind, Barbara G. Ryder - 2002
113 Software Engineering for Security: a Roadmap – Premkumar T. Devanbu, Stuart Stubblebine - 2000
183 DAISY: Dynamic Compilation for 100% Architectural Compatibility – Kemal Ebcioglu, Erik R. Altman - 1997
109 Practicing JUDO: Java under dynamic optimizations – M Cierniak, G Lueh, J Stichnoth - 2000