BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (7)
softwar (4)
model (4)
program (4)
attack (3)

Stem defens$ (all stems)

35 papers:

ITiCSEITiCSE-2015-Ben-Ari #programming
In Defense of Programming (MBA), p. 2.
HPCAHPCA-2015-HungerKRDVT #comprehension #using
Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
KDDKDD-2013-SunMY #bibliography
Synthetic review spamming and defense (HS, AM, XY), pp. 1088–1096.
SEKESEKE-2013-YuFCL #in the cloud #modelling
Modeling and Analyzing Attack-Defense Strategy of Resource Service in Cloud Computing (HY, GF, LC, DL), pp. 77–82.
SACSAC-2013-Callau-ZoriJGPFP #framework #named
STONE: a stream-based DDoS defense framework (MCZ, RJP, VG, MP, ZF, MPM), pp. 807–812.
CGOCGO-2013-BaoD
Defensive loop tiling for shared cache (BB, CD), p. 11.
SCAMSCAM-2012-YuanJ #compilation #named
CAWDOR: Compiler Assisted Worm Defense (JY, RJ), pp. 54–63.
SACSAC-2012-TownsendHS #modelling
Relationship of reproduction and evolutionary computation to analytical modeling of the ecological genetics of inducible defenses (GCT, WNH, BS), pp. 1375–1380.
SACSAC-2010-SardanaJ #network
Dual-level defense for networks under DDoS attacks (AS, RCJ), pp. 733–734.
SPLCSPLC-2010-JonesN #case study #experience #product line
Recent Experiences with Software Product Lines in the US Department of Defense (LGJ, LMN), pp. 486–490.
HPDCHPDC-2010-WiebelitzBKS #grid
Early defense: enabling attribute-based authorization in Grid firewalls (JW, MB, CK, MS), pp. 336–339.
AdaSIGAda-2009-Smart #ada
A look at Ada from both sides now (a government, and a defense contractor perspective) (JCS), pp. 119–120.
ECIRECIR-2009-GanstererP #classification #email
E-Mail Classification for Phishing Defense (WNG, DP), pp. 449–460.
EDOCEDOC-2008-SommestadEJ #analysis #architecture #enterprise #graph #modelling #security
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
CASECASE-2007-MattikalliFFLT
Optimal Sensor Selection and Placement for Perimeter Defense (RSM, RDF, PDF, SL, PZT), pp. 911–918.
SEKESEKE-2007-WeiAZ #effectiveness #framework #network #validation
Validating A Layered Decision Framework for Cost-Effective Network Defense (HW, JAF, DZ), pp. 105–110.
SACSAC-2006-SchiavoniQ #architecture #component #programming #tool support
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures (VS, VQ), pp. 1734–1738.
ICEISICEIS-v1-2005-Pellerin #adaptation #enterprise #maintenance #process
Adapting ERP Systems for Supporting Defense Maintenance Processes (RP), pp. 293–299.
AMOSTAMOST-2005-Lakey #industrial #modelling #specification #testing
Model-based specification and testing applied to the Ground-Based Midcourse Defense (GMD) system: an industry report (PBL).
HPCAHPCA-2004-LiuSK #memory management
Organizing the Last Line of Defense before Hitting the Memory Wall for CMP (CL, AS, MTK), pp. 176–185.
OSDIOSDI-2002-QiePP #programming #tool support #using
Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software (XQ, RP, LLP), pp. 45–60.
VMCAIVMCAI-2002-BartheDJS #virtual machine
A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines (GB, GD, LJ, SMdS), pp. 32–45.
TOOLSTOOLS-USA-2001-McClure #how #privacy #security
Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
SACSAC-2000-PandaT #dependence #information management
Data Dependency Based Logging for Defensive Information Warfare (BP, ST), pp. 361–365.
TOOLSTOOLS-USA-1999-Firesmith99a #comparison #contract #design #development
A Comparison of Defensive Development and Design by Contract (DF), pp. 258–267.
ICPRICPR-1998-HuYT
In defense of the Hough transform (ZH, YY, HTT), pp. 24–26.
ICMLICML-1994-Elomaa #learning
In Defense of C4.5: Notes Learning One-Level Decision Trees (TE), pp. 62–69.
TOOLSTOOLS-EUROPE-1994-Rubio #c++
C++: Attacks and Defenses (JAR), pp. 429–435.
STOCSTOC-1993-RackoffS #analysis #encryption
Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
ICSEICSE-1989-Weyuker #test coverage
In Defense of Coverage Criteria (EJW), p. 361.
ICLPICLP-1987-LindholmO87 #implementation #performance #prolog #semantics
Efficient Implementation of a Defensible Semantics for Dynamic PROLOG Code (TGL, RAO), pp. 21–39.
AdaDIPL-1976-Fisher #programming language
The Common Programming Language Effort of the Department of Defense (DF), pp. 1–6.
ICSEICSE-1976-Carlson #research
Software Research in the Department of Defense (WEC), pp. 379–383.
ICSEICSE-1976-Whitaker #re-engineering
A Defense View of Software Engineering (WAW), pp. 358–362.
DACDAC-1967-Mitchell #automation #challenge #design
Design automation’s challenge to defense technical data (DRM).

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.