35 papers:
ITiCSE-2015-Ben-Ari #programming- In Defense of Programming (MBA), p. 2.
HPCA-2015-HungerKRDVT #comprehension #using- Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
KDD-2013-SunMY #bibliography- Synthetic review spamming and defense (HS, AM, XY), pp. 1088–1096.
SEKE-2013-YuFCL #in the cloud #modelling- Modeling and Analyzing Attack-Defense Strategy of Resource Service in Cloud Computing (HY, GF, LC, DL), pp. 77–82.
SAC-2013-Callau-ZoriJGPFP #framework #named- STONE: a stream-based DDoS defense framework (MCZ, RJP, VG, MP, ZF, MPM), pp. 807–812.
CGO-2013-BaoD- Defensive loop tiling for shared cache (BB, CD), p. 11.
SCAM-2012-YuanJ #compilation #named- CAWDOR: Compiler Assisted Worm Defense (JY, RJ), pp. 54–63.
SAC-2012-TownsendHS #modelling- Relationship of reproduction and evolutionary computation to analytical modeling of the ecological genetics of inducible defenses (GCT, WNH, BS), pp. 1375–1380.
SAC-2010-SardanaJ #network- Dual-level defense for networks under DDoS attacks (AS, RCJ), pp. 733–734.
SPLC-2010-JonesN #case study #experience #product line- Recent Experiences with Software Product Lines in the US Department of Defense (LGJ, LMN), pp. 486–490.
HPDC-2010-WiebelitzBKS #grid- Early defense: enabling attribute-based authorization in Grid firewalls (JW, MB, CK, MS), pp. 336–339.
SIGAda-2009-Smart #ada- A look at Ada from both sides now (a government, and a defense contractor perspective) (JCS), pp. 119–120.
ECIR-2009-GanstererP #classification #email- E-Mail Classification for Phishing Defense (WNG, DP), pp. 449–460.
EDOC-2008-SommestadEJ #analysis #architecture #enterprise #graph #modelling #security- Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
CASE-2007-MattikalliFFLT- Optimal Sensor Selection and Placement for Perimeter Defense (RSM, RDF, PDF, SL, PZT), pp. 911–918.
SEKE-2007-WeiAZ #effectiveness #framework #network #validation- Validating A Layered Decision Framework for Cost-Effective Network Defense (HW, JAF, DZ), pp. 105–110.
SAC-2006-SchiavoniQ #architecture #component #programming #tool support- A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures (VS, VQ), pp. 1734–1738.
ICEIS-v1-2005-Pellerin #adaptation #enterprise #maintenance #process- Adapting ERP Systems for Supporting Defense Maintenance Processes (RP), pp. 293–299.
AMOST-2005-Lakey #industrial #modelling #specification #testing- Model-based specification and testing applied to the Ground-Based Midcourse Defense (GMD) system: an industry report (PBL).
HPCA-2004-LiuSK #memory management- Organizing the Last Line of Defense before Hitting the Memory Wall for CMP (CL, AS, MTK), pp. 176–185.
OSDI-2002-QiePP #programming #tool support #using- Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software (XQ, RP, LLP), pp. 45–60.
VMCAI-2002-BartheDJS #virtual machine- A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines (GB, GD, LJ, SMdS), pp. 32–45.
TOOLS-USA-2001-McClure #how #privacy #security- Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
SAC-2000-PandaT #dependence #information management- Data Dependency Based Logging for Defensive Information Warfare (BP, ST), pp. 361–365.
TOOLS-USA-1999-Firesmith99a #comparison #contract #design #development- A Comparison of Defensive Development and Design by Contract (DF), pp. 258–267.
ICPR-1998-HuYT- In defense of the Hough transform (ZH, YY, HTT), pp. 24–26.
ICML-1994-Elomaa #learning- In Defense of C4.5: Notes Learning One-Level Decision Trees (TE), pp. 62–69.
TOOLS-EUROPE-1994-Rubio #c++- C++: Attacks and Defenses (JAR), pp. 429–435.
STOC-1993-RackoffS #analysis #encryption- Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
ICSE-1989-Weyuker #test coverage- In Defense of Coverage Criteria (EJW), p. 361.
ICLP-1987-LindholmO87 #implementation #performance #prolog #semantics- Efficient Implementation of a Defensible Semantics for Dynamic PROLOG Code (TGL, RAO), pp. 21–39.
DIPL-1976-Fisher #programming language- The Common Programming Language Effort of the Department of Defense (DF), pp. 1–6.
ICSE-1976-Carlson #research- Software Research in the Department of Defense (WEC), pp. 379–383.
ICSE-1976-Whitaker #re-engineering- A Defense View of Software Engineering (WAW), pp. 358–362.
DAC-1967-Mitchell #automation #challenge #design- Design automation’s challenge to defense technical data (DRM).