Author of the publication

Recognition and categorization considerations for information assurance requirements development and speficication.

, , and . Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security, volume 7344 of SPIE Proceedings, page 73440K. SPIE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Statistically optimal interslice value interpolation in 3D medical imaging: theory and implementation., , , and . CBMS, page 276-283. IEEE Computer Society, (1992)The Shape of Crimeware to Come (review of Crimeware: Understanding New Attacks and Defenses by M. Jacobsson and Z. Ramzan) Book reviews.. IEEE Secur. Priv., 6 (5): 5 (2008)The Virtual SpacePlane., , , , and . IEEE Computer Graphics and Applications, 21 (2): 42-52 (2001)The Solar System Modeler., , and . IEEE Computer Graphics and Applications, 17 (5): 47-57 (1997)Progress and Prospects for the Development of Computer Generated Actors for Military Simulation, Part 3 - The Road Ahead., and . Presence Teleoperators Virtual Environ., 12 (6): 629-643 (2003)The distributed mission training integrated threat environment system architecture and design., and . ACM Trans. Model. Comput. Simul., 11 (1): 106-133 (2001)Considering Defense in Depth for Software Applications.. IEEE Secur. Priv., 2 (1): 72-75 (2004)Three-dimensional medical image analysis using local dynamic algorithm selection on a multiple-instruction, multiple-data architecture.. University of Michigan, USA, (1989)What Are the Numbers? review of "Security metrics: Replacing Fear, Uncertainty, and Doubt; Jaquith, A.; 2006.. IEEE Secur. Priv., 5 (6): 12 (2007)Under the Black Hat.. IEEE Secur. Priv., 3 (3): 5 (2005)