BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Finland
1 × Germany
1 × Ireland
1 × Italy
1 × South Africa
1 × Spain
1 × Switzerland
11 × USA
Collaborated with:
Z.Dang G.Vigna P.Z.Kolano A.Coen-Porisini D.Mandrioli B.J.Walker G.J.Popek J.Douglas C.Ghezzi F.Valeur T.Bultan O.H.Ibarra J.Su D.Balzarotti G.Banks M.Cova V.Felmetsger W.K.Robertson
Talks about:
system (7) astral (5) secur (5) time (5) specif (4) real (4) intrus (3) detect (3) implement (2) pushdown (2)

Person: Richard A. Kemmerer

DBLP DBLP: Kemmerer:Richard_A=

Facilitated 1 volumes:

ICSE 1998Ed

Contributed to:

ICSM 20112011
ISSTA 20082008
ASE 20052005
ESEC/FSE 20032003
ICSE 20032003
CIAA 20012001
CAV 20002000
FASE 20002000
ICSE 20002000
ISSTA 20002000
ICSE 19991999
ESEC/FSE 19971997
ESEC 19951995
ISSTA 19941994
ISSTA 19931993
ESEC 19911991
ICSE 19891989
SOSP 19791979
SOSP 19791980

Wrote 20 papers:

ICSM-2011-Kemmerer #how #what
How to steal a botnet and what can happen when you do (RAK), p. 1.
ISSTA-2008-BalzarottiBCFKRVV #security #testing
Are your votes really counted?: testing the security of real-world electronic voting systems (DB, GB, MC, VF, RAK, WKR, FV, GV), pp. 237–248.
ASE-2005-Kemmerer #design #detection #implementation #product line
Designing and implementing a family of intrusion detection systems (RAK), p. 3.
ESEC-FSE-2003-VignaVK #design #detection #implementation #product line
Designing and implementing a family of intrusion detection systems (GV, FV, RAK), pp. 88–97.
ICSE-2003-Kemmerer
Cybersecurity (RAK), pp. 705–717.
ICSE-2003-KemmererV #detection #internet #security
Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
CIAA-2001-DangBIK #automaton
Past Pushdown Timed Automata (ZD, TB, OHI, RAK), pp. 74–86.
CAV-2000-DangIBKS #analysis #automaton #reachability
Binary Reachability Analysis of Discrete Pushdown Timed Automata (ZD, OHI, TB, RAK, JS), pp. 69–84.
FASE-2000-KolanoKM #parallel #realtime #refinement
Parallel Refinement Mechanisms for Real-Time Systems (PZK, RAK, DM), pp. 35–50.
ICSE-2000-DangK #approximate #infinity #model checking #realtime
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems (ZD, RAK), pp. 345–354.
ISSTA-2000-KolanoK #analysis #classification #realtime
Classification schemes to aid in the analysis of real-time systems (PZK, RAK), pp. 86–95.
ICSE-1999-DangK #mobile #model checking #using
Using the ASTRAL Model Checker to Analyze Mobile IP (ZD, RAK), pp. 132–142.
ESEC-FSE-1997-Kemmerer #distributed #security
Security Issues in Distributed Software (RAK), pp. 52–59.
ESEC-1995-Coen-PorisiniKM #framework #proving
A Formal Framework for ASTRAL Inter-level Proof Obligations (ACP, RAK, DM), pp. 90–108.
ISSTA-1994-DouglasK #execution #named #specification #symbolic computation #testing
Aslantest: A Symbolic Execution Tool for Testing Aslan Formal Specifications (JD, RAK), pp. 15–27.
ISSTA-1993-Coen-PorisiniK #realtime #specification
The Composability of ASTRAL Realtime Specifications (ACP, RAK), pp. 128–138.
ESEC-1991-GhezziK #named #realtime #specification
ASTRAL: An Assertion Language for Specifying Realtime Systems (CG, RAK), pp. 122–146.
ICSE-1989-Kemmerer
Completely Validated Software (RAK), pp. 359–360.
SOSP-1979-WalkerKP #kernel #security #specification #verification
Specification and Verification of the UCLA Unix Security Kernel (BJW, RAK, GJP), pp. 64–65.
SOSP-J-1979-WalkerKP80 #kernel #security #specification #verification
Specification and Verification of the UCLA Unix Security Kernel (BJW, RAK, GJP), pp. 118–131.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.