35 papers:
- ITiCSE-2015-Ben-Ari #programming
- In Defense of Programming (MBA), p. 2.
- HPCA-2015-HungerKRDVT #comprehension #using
- Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
- KDD-2013-SunMY #bibliography
- Synthetic review spamming and defense (HS, AM, XY), pp. 1088–1096.
- SEKE-2013-YuFCL #in the cloud #modelling
- Modeling and Analyzing Attack-Defense Strategy of Resource Service in Cloud Computing (HY, GF, LC, DL), pp. 77–82.
- SAC-2013-Callau-ZoriJGPFP #framework #named
- STONE: a stream-based DDoS defense framework (MCZ, RJP, VG, MP, ZF, MPM), pp. 807–812.
- CGO-2013-BaoD
- Defensive loop tiling for shared cache (BB, CD), p. 11.
- SCAM-2012-YuanJ #compilation #named
- CAWDOR: Compiler Assisted Worm Defense (JY, RJ), pp. 54–63.
- SAC-2012-TownsendHS #modelling
- Relationship of reproduction and evolutionary computation to analytical modeling of the ecological genetics of inducible defenses (GCT, WNH, BS), pp. 1375–1380.
- SAC-2010-SardanaJ #network
- Dual-level defense for networks under DDoS attacks (AS, RCJ), pp. 733–734.
- SPLC-2010-JonesN #case study #experience #product line
- Recent Experiences with Software Product Lines in the US Department of Defense (LGJ, LMN), pp. 486–490.
- HPDC-2010-WiebelitzBKS #grid
- Early defense: enabling attribute-based authorization in Grid firewalls (JW, MB, CK, MS), pp. 336–339.
- SIGAda-2009-Smart #ada
- A look at Ada from both sides now (a government, and a defense contractor perspective) (JCS), pp. 119–120.
- ECIR-2009-GanstererP #classification #email
- E-Mail Classification for Phishing Defense (WNG, DP), pp. 449–460.
- EDOC-2008-SommestadEJ #analysis #architecture #enterprise #graph #modelling #security
- Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
- CASE-2007-MattikalliFFLT
- Optimal Sensor Selection and Placement for Perimeter Defense (RSM, RDF, PDF, SL, PZT), pp. 911–918.
- SEKE-2007-WeiAZ #effectiveness #framework #network #validation
- Validating A Layered Decision Framework for Cost-Effective Network Defense (HW, JAF, DZ), pp. 105–110.
- SAC-2006-SchiavoniQ #architecture #component #programming #tool support
- A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures (VS, VQ), pp. 1734–1738.
- ICEIS-v1-2005-Pellerin #adaptation #enterprise #maintenance #process
- Adapting ERP Systems for Supporting Defense Maintenance Processes (RP), pp. 293–299.
- AMOST-2005-Lakey #industrial #modelling #specification #testing
- Model-based specification and testing applied to the Ground-Based Midcourse Defense (GMD) system: an industry report (PBL).
- HPCA-2004-LiuSK #memory management
- Organizing the Last Line of Defense before Hitting the Memory Wall for CMP (CL, AS, MTK), pp. 176–185.
- OSDI-2002-QiePP #programming #tool support #using
- Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software (XQ, RP, LLP), pp. 45–60.
- VMCAI-2002-BartheDJS #virtual machine
- A Formal Correspondence between Offensive and Defensive JavaCard Virtual Machines (GB, GD, LJ, SMdS), pp. 32–45.
- TOOLS-USA-2001-McClure #how #privacy #security
- Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
- SAC-2000-PandaT #dependence #information management
- Data Dependency Based Logging for Defensive Information Warfare (BP, ST), pp. 361–365.
- TOOLS-USA-1999-Firesmith99a #comparison #contract #design #development
- A Comparison of Defensive Development and Design by Contract (DF), pp. 258–267.
- ICPR-1998-HuYT
- In defense of the Hough transform (ZH, YY, HTT), pp. 24–26.
- ICML-1994-Elomaa #learning
- In Defense of C4.5: Notes Learning One-Level Decision Trees (TE), pp. 62–69.
- TOOLS-EUROPE-1994-Rubio #c++
- C++: Attacks and Defenses (JAR), pp. 429–435.
- STOC-1993-RackoffS #analysis #encryption
- Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
- ICSE-1989-Weyuker #test coverage
- In Defense of Coverage Criteria (EJW), p. 361.
- ICLP-1987-LindholmO87 #implementation #performance #prolog #semantics
- Efficient Implementation of a Defensible Semantics for Dynamic PROLOG Code (TGL, RAO), pp. 21–39.
- DIPL-1976-Fisher #programming language
- The Common Programming Language Effort of the Department of Defense (DF), pp. 1–6.
- ICSE-1976-Carlson #research
- Software Research in the Department of Defense (WEC), pp. 379–383.
- ICSE-1976-Whitaker #re-engineering
- A Defense View of Software Engineering (WAW), pp. 358–362.
- DAC-1967-Mitchell #automation #challenge #design
- Design automation’s challenge to defense technical data (DRM).