External Reviewers
暂无分享,去创建一个
Nasir Memon | Shambhu J. Upadhyaya | Kenneth Geers | Shiu-Kai Chin | Saeed Abu-Nimeh | Ronald Dodge | Daniel O. Rice | Jeffrey Carr | Raghu T. Santanam | Robert Bangert-Drowns | R. Sekar | Saeed Abu-Nimeh | S. Upadhyaya | R. Bangert-Drowns | R. Sekar | J. Carr | Kenneth Geers | N. Memon | R. Santanam | Ron Dodge | Shiu-Kai Chin
[1] Brayfield,et al. an Index of Job Satisfaction. , 1954 .
[2] William Craig,et al. Linear reasoning. A new form of the Herbrand-Gentzen theorem , 1957, Journal of Symbolic Logic.
[3] P. Blau. Exchange and Power in Social Life , 1964 .
[4] M. D. MacLaren. The Art of Computer Programming. Volume 2: Seminumerical Algorithms (Donald E. Knuth) , 1970 .
[5] F. Adler,et al. Sisters in Crime: The Rise of the New Female Criminal , 1976 .
[6] Edsger W. Dijkstra,et al. A Discipline of Programming , 1976 .
[7] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[8] L. Furby. Possession in humans: An exploratory study of its meaning and motivation. , 1978 .
[9] R. W. Gosper. Decision procedure for indefinite hypergeometric summation. , 1978, Proceedings of the National Academy of Sciences of the United States of America.
[10] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[11] W. Thornton,et al. Women's Liberation and the Female Delinquent , 1980 .
[12] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[13] David Gries,et al. The Science of Programming , 1981, Text and Monographs in Computer Science.
[14] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[15] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[16] R. Mizerski. An Attribution Explanation of the Disproportionate Influence of Unfavorable Information , 1982 .
[17] Robert S. Boyer,et al. The Correctness Problem in Computer Science , 1982 .
[18] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[19] D. Kolb. Experiential Learning: Experience as the Source of Learning and Development , 1983 .
[20] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[21] S. Box,et al. Liberation/Emancipation, Economic Marginalization, or Less Chivalry , 1984 .
[22] Hartmut Ehrig,et al. Fundamentals of Algebraic Specification 1: Equations and Initial Semantics , 1985 .
[23] P. Burmeister. A Model Theoretic Oriented Approach to Partial Algebras , 1986 .
[24] M. Sashkin. Participative management remains an ethical imperative , 1986 .
[25] Marilyn M. Mantei,et al. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 1986, CHI 1986.
[26] Peter B. Andrews. An introduction to mathematical logic and type theory - to truth through proof , 1986, Computer science and applied mathematics.
[27] Wolfgang Reisig,et al. Petri Nets: Applications and Relationships to Other Models of Concurrency , 1986, Lecture Notes in Computer Science.
[28] Robert E. Tarjan,et al. Three Partition Refinement Algorithms , 1987, SIAM J. Comput..
[29] Brian W. Kernighan,et al. The C Programming Language, Second Edition , 1988 .
[30] J. Habermas,et al. The theory of communicative action. Volume 2, Lifeworld andsystem : a critique of functionalist reason , 1989 .
[31] J. Michael Spivey,et al. The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.
[32] Michael J. C. Gordon,et al. Mechanizing programming logics in higher order logic , 1989 .
[33] Amin Rajan,et al. In the age of the smart machine , 1990 .
[34] D. Straub. Effective IS Security , 1990 .
[35] Colin O'Halloran,et al. A Calculus of Information Flow , 1990, ESORICS.
[36] Robert S. Boyer,et al. Computational Logic , 1990, ESPRIT Basic Research Series.
[37] Hartmut Ehrig,et al. Fundamentals of Algebraic Specification 2: Module Specifications and Constraints , 1990 .
[38] J. Merrill,et al. Media Debates: Issues in Mass Communication , 1990 .
[39] L. J. Williams,et al. Job Satisfaction and Organizational Commitment as Predictors of Organizational Citizenship and In-Role Behaviors , 1991 .
[40] Robert S. Boyer,et al. Functional Instantiation in First-Order Logic , 1991, Artificial and Mathematical Theory of Computation.
[41] Richard P. Bagozzi,et al. Assessing Construct Validity in Organizational Research , 1991 .
[42] K. Booth. Security and emancipation , 1991, Review of International Studies.
[43] Thomas F. Melham. A Package For Inductive Relation Definitions In HOL , 1991, 1991., International Workshop on the HOL Theorem Proving System and Its Applications.
[44] Sten Agerholm. Mechanizing Program Verification in HOL , 1991, 1991., International Workshop on the HOL Theorem Proving System and Its Applications.
[45] M. Alvesson,et al. On the Idea of Emancipation in Management and Organization Studies , 1992 .
[46] Thomas Y. C. Woo,et al. Authentication for distributed systems , 1997, Computer.
[47] Robert Givan,et al. New Results on Local Inference Relations , 1992, KR.
[48] William M. Farmer,et al. Little Theories , 1992, CADE.
[49] John McLean,et al. Proving Noninterference and Functional Correctness Using Traces , 1992, J. Comput. Secur..
[50] G. Winskel. The formal semantics of programming languages , 1993 .
[51] David A. McAllester. Automatic recognition of tractability in inference relations , 1993, JACM.
[52] Ken Peffers,et al. The Impact of Information Technology Investment Announcements on the Market Value of the Firm , 1993, Inf. Syst. Res..
[53] Robert W. Floyd,et al. Assigning Meanings to Programs , 1993 .
[54] M. Gordon,et al. Introduction to HOL: a theorem proving environment for higher order logic , 1993 .
[55] Peter V. Homeier,et al. Trustworthy Tools for Trustworthy Programs: A Verified Verification Condition Generator , 1994, TPHOLs.
[56] Martín Abadi,et al. A TLA Solution to the RPC-Memory Specification Problem , 2016, Formal Systems Specification.
[57] William L. Benoit,et al. Accounts, excuses, and apologies : a theory of image restoration strategies , 1994 .
[58] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[59] Gerard J. Holzmann,et al. An improvement in formal verification , 1994, FORTE.
[60] G. Siomkos,et al. The Hidden Crisis in Product‐harm Crisis Management , 1994 .
[61] Message Passing Interface Forum. MPI: A message - passing interface standard , 1994 .
[62] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[63] Rudy Hirschheim,et al. Realizing Emancipatory Principles in Information Systems Development: The Case for ETHICS , 1994, MIS Q..
[64] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[65] Dennis E. Garrett,et al. The effectiveness of corporate communicative responses to accusations of unethical behavior , 1995 .
[66] Thomas A. Henzinger,et al. Computing simulations on finite and infinite graphs , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[67] Patrice Godefroid,et al. Partial-Order Methods for the Verification of Concurrent Systems , 1996, Lecture Notes in Computer Science.
[68] Randall P. Settoon,et al. Social Exchange in Organizations: Perceived Organizational Support, Leader-Member Exchange, and Employee Reciprocity , 1996 .
[69] Harald Ganzinger,et al. Complexity analysis based on ordered resolution , 1996, Proceedings 11th Annual IEEE Symposium on Logic in Computer Science.
[70] Tobias Nipkow. Winskel is (Almost) Right: Towards a Mechanized Semantics Textbook , 1996, FSTTCS.
[71] Simon L. Peyton Jones,et al. Type classes in Haskell , 1994, TOPL.
[72] Bruno Buchberger. Symbolic Computation: Computer Algebra and Logic , 1996, FroCoS.
[73] Stephen Wolfram,et al. The Mathematica Book , 1996 .
[74] Sherry J. Holladay,et al. Communication and Attributions in a Crisis: An Experimental Study in Crisis Communication , 1996 .
[75] Birgit Benkhoff. Ignoring Commitment Is Costly: New Approaches Establish the Missing Link Between Commitment and Performance , 1997 .
[76] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .
[77] Richard Kirshenbaum,et al. Under the Radar: Talking to Today's Cynical Consumer , 1997 .
[78] E. Stewart Lee,et al. A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[79] Nancy R. Mead,et al. Survivable Network Systems: An Emerging Discipline , 1997 .
[80] Christoph Sprenger,et al. A Verified Model Checker for the Modal µ-calculus in Coq , 1998, TACAS.
[81] Tobias Nipkow,et al. Javalight is type-safe—definitely , 1998, POPL '98.
[82] W. T. Coombs,et al. An Analytic Framework for Crisis Situations: Better Responses From a Better Understanding of the Situation , 1998 .
[83] Wolfgang Naraschewski,et al. Object-Oriented Verification Based on Record Subtyping in Higher-Order Logic , 1998, TPHOLs.
[84] Paul J. Kobulnicky,et al. Commitment in the workplace: Theory, research and application , 1998 .
[85] Steve A. Schneider. Verifying Authentication Protocols in CSP , 1998, IEEE Trans. Software Eng..
[86] J. R. Gregory. Does Corporate Reputation Provide a Cushion to Companies Facing Market Volatility? Some Supportive Evidence , 1998 .
[87] R. Ulmer,et al. The compatibility of corrective action in organizational crisis communication , 1998 .
[88] Steve A. Schneider,et al. Concurrent and Real-time Systems: The CSP Approach , 1999 .
[89] R. Knight,et al. Corporate Catastrophes, Stock Returns, and Trading Volume , 1999 .
[90] Matthias Felleisen,et al. A Programmer's Reduction Semantics for Classes and Mixins , 1999, Formal Syntax and Semantics of Java.
[91] Eric Walden,et al. The Impact of E-Commerce Announcements on the Market Value of Firms , 2001, Inf. Syst. Res..
[92] Sophia Drossopoulou,et al. Describing the Semantics of Java and Proving Type Soundness , 1999, Formal Syntax and Semantics of Java.
[93] Stefan Berghofer,et al. Inductive Datatypes in HOL - Lessons Learned in Formal-Logic Engineering , 1999, TPHOLs.
[94] Nancy R. Mead,et al. Survivability: Protecting Your Critical Systems , 1999, IEEE Internet Comput..
[95] Kevin J. Sullivan,et al. Information survivability control systems , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[96] Leslie Lamport,et al. Model Checking TLA+ Specifications , 1999, CHARME.
[97] Cynthia E. Irvine,et al. Amplifying Security Education in the Laboratory , 1999 .
[98] S. Karstedt. Emancipation, crime and problem behavior of women: A perspective from Germany , 2000 .
[99] Wolfgang Reif,et al. Do You Trust Your Model Checker? , 2000, FMCAD.
[100] David Thomas,et al. Programming Ruby: the pragmatic programmer's guide , 2000 .
[101] Chris Lattner,et al. LLVM: AN INFRASTRUCTURE FOR MULTI-STAGE OPTIMIZATION , 2000 .
[102] Heiko Mantel,et al. Possibilistic definitions of security-an assembly kit , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[103] L. Barton. Crisis in Organizations II , 2000 .
[104] Matthew C. Elder,et al. Survivability architectures: issues and approaches , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[105] Lawrence C. Paulson,et al. A fixedpoint approach to (co)inductive and (co)datatype definitions , 2000, Proof, Language, and Interaction.
[106] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[107] R. Ulmer,et al. Consistent Questions of Ambiguity in Organizational Crisis Communication: Jack in the Box as a Case Study , 2000 .
[108] R. Constable,et al. Nuprl ’ s Class Theory and its Applications , 2000 .
[109] Heiko Mantel,et al. A generic approach to the security of multi-threaded programs , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[110] Owre Sam,et al. Theory Interpretations in PVS , 2001 .
[111] James N. Druckman,et al. The Implications of Framing Effects for Citizen Competence , 2001 .
[112] Marieke Huisman,et al. Reasoning about Java programs in higher order logic using PVS and Isabelle , 2001 .
[113] Heiko Mantel,et al. Preserving information flow properties under refinement , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[114] Anna Philippou,et al. Tools and Algorithms for the Construction and Analysis of Systems , 2018, Lecture Notes in Computer Science.
[115] Evi Nemeth,et al. DNS measurements at a root server , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[116] David von Oheimb. Analyzing Java in Isabelle-HOL: formalization, type safety and Hoare logic , 2001 .
[117] Udo W. Pooch,et al. Using an isolated network laboratory to teach advanced networks and security , 2001, SIGCSE '01.
[118] James Backhouse,et al. Current directions in IS security research: towards socio‐organizational perspectives , 2001, Inf. Syst. J..
[119] Brian D. Noble,et al. When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[120] Harald Ganzinger. Relating semantic and proof-theoretic concepts for polynomial time decidability of uniform word problems , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.
[121] Michael Goldsmith,et al. Modelling and analysis of security protocols , 2001 .
[122] Varun Grover,et al. Research Report: A Reexamination of IT Investment and the Market Value of the Firm - An Event Study Methodology , 2001, Inf. Syst. Res..
[123] Matthew C. Elder,et al. Fault tolerance in critical information systems , 2001 .
[124] Hoyt Lougee,et al. SOFTWARE CONSIDERATIONS IN AIRBORNE SYSTEMS AND EQUIPMENT CERTIFICATION , 2001 .
[125] A. Bandura. Social cognitive theory: an agentic perspective. , 1999, Annual review of psychology.
[126] Amin Vahdat,et al. A chat room assignment for teaching network security , 2001, SIGCSE '01.
[127] David Thomas,et al. The Art in Computer Programming , 2001 .
[128] Gerardo Lafferriere,et al. Symbolic Reachability Computation for Families of Linear Vector Fields , 2001, J. Symb. Comput..
[129] Vern Paxson,et al. An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.
[130] Florian Kammüller,et al. Encoding Object-Z in Isabelle/HOL , 2002, ZB.
[131] Lawrence Charles Paulson,et al. Isabelle/HOL: A Proof Assistant for Higher-Order Logic , 2002 .
[132] I. S. W. B. Prasetya,et al. A survey on embedding programming logics in a theorem prover , 2002 .
[133] Steve A. Schneider. Verifying Authentication Protocol Implementations , 2002, FMOODS.
[134] Keijo Heljanko,et al. Testing LTL formula translation into Büchi automata , 2002, International Journal on Software Tools for Technology Transfer.
[135] Patrick M. Kreiser. Creating Corporate Reputations: Identity, Image, and Performance , 2002 .
[136] Leslie Lamport,et al. High-Level Specifications: Lessons from Industry , 2002, FMCO.
[137] A. Erez,et al. The nature and dimensionality of organizational citizenship behavior: a critical review and meta-analysis. , 2002, The Journal of applied psychology.
[138] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[139] Asia , 2002 .
[140] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[141] Vallabh Sambamurthy,et al. The Shareholder-Wealth and Trading-Volume Effects of Information-Technology Infrastructure Investments , 2002, J. Manag. Inf. Syst..
[142] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[143] Samuel T. King,et al. ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.
[144] Michael Fry,et al. Panel on integrating security concepts into existing computer courses , 2002, SIGCSE '02.
[145] Markus Müller-Olm,et al. Polynomial Constants Are Decidable , 2002, SAS.
[146] John C. Windsor,et al. Risks and Effects of IS/IT Outsourcing: A Securities Market Assessment1 , 2002 .
[147] Peter D. Mosses,et al. CASL: the Common Algebraic Specification Language , 2002, Theor. Comput. Sci..
[148] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[149] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[150] Tobias Nipkow,et al. Hoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited , 2002, FME.
[151] Dawn Song,et al. The TESLA Broadcast Authentication Protocol , 2002 .
[152] R. Eisenberger,et al. Perceived organizational support: a review of the literature. , 2002, The Journal of applied psychology.
[153] Leslie Lamport,et al. Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers [Book Review] , 2002, Computer.
[154] A. Cooper. Media framing and social movement mobilization: German peace protest against INF missiles, the Gulf War, and NATO peace enforcement in Bosnia , 2002 .
[155] Dieter Hutter,et al. The Development Graph Manager MAYA , 2002, AMAST.
[156] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[157] Dubravka Cecez-Kecmanovic,et al. The rationality framework for a critical study of information systems , 2002, J. Inf. Technol..
[158] Julie Yioutas,et al. Revisiting the Clinton/Lewinsky Scandal: The Convergence of Agenda Setting and Framing , 2003 .
[159] Abdullah Gani,et al. Bayesian Learning Networks Approach to Cybercrime Detection , 2003 .
[160] Ashish Garg,et al. The Financial Impact of IT Security Breaches: What Do Investors Think? , 2003, Inf. Secur. J. A Glob. Perspect..
[161] S. Hunter. Information Technology, Organizational Learning, and the Market Value of the Firm , 2003 .
[162] Heiko Mantel. A uniform framework for the formal specification and verification of information flow security , 2003 .
[163] Lei Zhou,et al. The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market , 2003, J. Comput. Secur..
[164] Serge Autexier,et al. Hierarchical contextual reasoning , 2003 .
[165] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[166] Christoph Walther,et al. About eriFun , 2003 .
[167] Peter J. Denning,et al. Great principles of computing , 2015, CACM.
[168] Bart Jacobs,et al. Java Program Verification at Nijmegen: Developments and Perspective , 2003, ISSS.
[169] M. Crum,et al. Management practices as antecedents of safety culture within the trucking industry: similarities and differences by hierarchical level. , 2003, Journal of safety research.
[170] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[171] Craig E. Carroll,et al. Agenda-setting Effects of Business News on the Public's Images and Opinions about Major Corporations , 2003 .
[172] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[173] Achim D. Brucker,et al. HOL-Z 2.0: A Proof Environment for Z-Specifications , 2003, J. Univers. Comput. Sci..
[174] Bruce W. Char,et al. Redesigning introductory computer programming using multi-level online modules for a mixed audience , 2003, SIGCSE.
[175] Roger Smith. Simulating Information Warfare Using the HLA Management Object Model , 2003 .
[176] L. V. Dyne,et al. The employment relationships of foreign workers versus local employees: A field study of organizational justice, job satisfaction, performance, and OCB , 2003 .
[177] S. Carter. Secure Position Aided Ad Hoc Routing , 2003 .
[178] A. Hovav,et al. The Impact of Denial‐of‐Service Attack Announcements on the Market Value of Firms , 2003 .
[179] M. Joslyn. Framing the Lewinsky Affair: Third‐Person Judgments by Scandal Frame , 2003 .
[180] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[181] C. Izard,et al. Responsible Behavior: The Importance of Social Cognition and Emotion. , 2003 .
[182] Scott B. MacKenzie,et al. Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.
[183] Kenneth L. McMillan,et al. Interpolation and SAT-Based Model Checking , 2003, CAV.
[184] Clemens Ballarin. Locales and Locale Expressions in Isabelle/Isar , 2003, TYPES.
[185] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[186] H. Raghav Rao,et al. Electronic Banking and Information Assurance Issues: Surveys and Synthesis , 2004, J. Organ. End User Comput..
[187] K. Rustan M. Leino,et al. The Spec# Programming System: An Overview , 2004, CASSIS.
[188] Rossouw von Solms,et al. From policies to culture , 2004, Comput. Secur..
[189] José Meseguer,et al. Rewriting Logic Semantics: From Language Specifications to Formal Analysis Tools , 2004, IJCAR.
[190] José Meseguer,et al. Formal Analysis of Java Programs in JavaFAN , 2004, CAV.
[191] Craig E. Carroll. How the mass media influence perceptions of corporate reputation: exploring agenda-setting effects within business news coverage , 2004 .
[192] Myla Archer,et al. TAME: Using PVS strategies for special-purpose theorem proving , 2001, Annals of Mathematics and Artificial Intelligence.
[193] Huseyin Cavusoglu,et al. The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers , 2004, Int. J. Electron. Commer..
[194] Shivraj Kanungo,et al. On the emancipatory role of rural information systems , 2004, Inf. Technol. People.
[195] Guilherme Ottoni,et al. RIFLE: An Architectural Framework for User-Centric Information-Flow Security , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[196] Enric Rodríguez-Carbonell,et al. Automatic Generation of Polynomial Loop Invariants: Algebraic Foundations , 2004, ISSAC '04.
[197] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[198] Rossouw von Solms,et al. Towards information security behavioural compliance , 2004, Comput. Secur..
[199] M. Meijer. Does Success Breed Success?: Effects of News and Advertising on Corporate Reputation , 2004 .
[200] C.E. Irvine,et al. The Trusted Computing Exemplar project , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[201] Christoph Walther,et al. Verification in the Classroom , 2004, Journal of Automated Reasoning.
[202] Elvinia Riccobene,et al. Proving Invariants of I/O Automata with TAME , 2004, Automated Software Engineering.
[203] Matt Kaufmann,et al. Structured Theory Development for a Mechanized Logic , 2001, Journal of Automated Reasoning.
[204] J. L. Pierce,et al. Psychological ownership and feelings of possession: three field studies predicting employee attitudes and organizational citizenship behavior , 2004 .
[205] Dragan Bosnacki,et al. Cluster-Based Partial-Order Reduction , 2004 .
[206] Deborah A. Frincke,et al. A case study in rapid introduction of an information assurance track into a software engineering curriculum , 2004, 17th Conference on Software Engineering Education and Training, 2004. Proceedings..
[207] Tudor Jebelean,et al. Automated Generation of Loop Invariants by Recurrence Solving in Theorema , 2004 .
[208] Laura Kovács,et al. An algorithm for automated generation of invariants for loops with conditionals , 2005, Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'05).
[209] Leslie Lamport,et al. A +CAL User’s Manual , 2005 .
[210] Irene M. Y. Woon,et al. Forthcoming: Journal of Information Privacy and Security , 2022 .
[211] Terrill L. Frantz,et al. Communication Networks from the Enron Email Corpus “It's Always About the People. Enron is no Different” , 2005, Comput. Math. Organ. Theory.
[212] Madan Musuvathi,et al. A Combination Method for Generating Interpolants , 2005, CADE.
[213] Alan Bundy,et al. Rippling - meta-level guidance for mathematical reasoning , 2005, Cambridge tracts in theoretical computer science.
[214] George C. Necula,et al. Data Structure Specifications via Local Equality Axioms , 2005, CAV.
[215] Detmar W. Straub,et al. A Practical Guide To Factorial Validity Using PLS-Graph: Tutorial And Annotated Example , 2005, Commun. Assoc. Inf. Syst..
[216] John Rushby,et al. Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .
[217] Michael J. Witbrock,et al. A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment , 2005, AAAI.
[218] Kenneth L. McMillan,et al. Applications of Craig Interpolants in Model Checking , 2005, TACAS.
[219] Axel Schairer,et al. Exploiting Generic Aspects of Security Models in Formal Developments , 2005, Mechanizing Mathematical Reasoning.
[220] Peter J. Denning,et al. Recentering computer science , 2005, CACM.
[221] Claude Marché,et al. Reasoning About Java Programs with Aliasing and Frame Conditions , 2005, TPHOLs.
[222] Kurt Stenzel. Verification of Java card programs , 2005 .
[223] Christoph Walther,et al. Reasoning About Incompletely Defined Programs , 2005, LPAR.
[224] H. Raghav Rao,et al. Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis , 2005, Decis. Support Syst..
[225] M. Kauers,et al. Algorithms for Nonlinear Higher Order Di erence Equa-tions , 2005 .
[226] Brian Huffman,et al. Axiomatic Constructor Classes in Isabelle/HOLCF , 2005, TPHOLs.
[227] Viorica Sofronie-Stokkermans,et al. Hierarchic Reasoning in Local Theory Extensions , 2005, CADE.
[228] Steve A. Schneider,et al. A decision procedure for the existence of a rank function , 2005, J. Comput. Secur..
[229] Kerry Trentelman,et al. Proving correctness of JavaCard DL taclets using Bali , 2005, Third IEEE International Conference on Software Engineering and Formal Methods (SEFM'05).
[230] George Stephanides,et al. The economic approach of information security , 2005, Comput. Secur..
[231] David B. Skillicorn,et al. Detecting unusual email communication , 2005, CASCON.
[232] Burkhart Wolff,et al. Verification of a Signature Architecture with HOL-Z , 2005, FM.
[233] Ralf Sasse,et al. Automatic Validation of Transformation Rules for Java Verification Against a Rewriting Semantics , 2005, LPAR.
[234] K. Rustan M. Leino,et al. Modular Verification of Static Class Invariants , 2005, FM.
[235] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..
[236] Ashish Tiwari,et al. Generating Polynomial Invariants for Hybrid Systems , 2005, HSCC.
[237] Deepak D'Souza,et al. An Automata Based Approach for Verifying Information Flow Properties , 2005, ARSPA@ICALP.
[238] Brenda Scott-Ladd,et al. Causal inferences between participation in decision making, task attributes, work effort, rewards, job satisfaction and commitment , 2006 .
[239] Achim D. Brucker,et al. The HOL-OCL Book , 2006 .
[240] Alessandro Acquisti,et al. Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.
[241] Deepak Kapur,et al. A Quantifier-Elimination Based Heuristic for Automatically Generating Inductive Assertions for Programs , 2006, J. Syst. Sci. Complex..
[242] Rajiv Kishore,et al. Market reactions to E-business outsourcing announcements: An event study , 2006, Inf. Manag..
[243] William Yurcik,et al. A statistical analysis of disclosed storage security breaches , 2006, StorageSS '06.
[244] Siraj Ahmed Shaikh,et al. Analysing the Woo-Lam Protocol Using CSP and Rank Functions , 2006, J. Res. Pract. Inf. Technol..
[245] Nitin Aggarwal,et al. Do Markets Prefer Open or Proprietary Standards for XML Standardization? An Event Study , 2006, Int. J. Electron. Commer..
[246] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[247] Jeffrey M. Stanton,et al. Examining employee compliance with organizational surveillance and monitoring , 2006 .
[248] Tatu Ylönen,et al. The Secure Shell (SSH) Protocol Architecture , 2006, RFC.
[249] Jonathan White,et al. Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security , 2006, Security and Management.
[250] Samir Chatterjee,et al. e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[251] Randy Johnson,et al. Engineering the Tokeneer Enclave Protection Software , 2006 .
[252] Bernhard Beckert,et al. Dynamic logic with non-rigid functions a basis for object-oriented program verification , 2006 .
[253] M. Hitt,et al. Market value effects of acquisitions involving internet firms: a resource‐based analysis , 2006 .
[254] Christoph Walther,et al. The L 1.0 Primer , 2006 .
[255] James Walden,et al. Secure software engineering teaching modules , 2006, InfoSecCD '06.
[256] Harald Ganzinger,et al. Modular proof systems for partial functions with Evans equality , 2006, Inf. Comput..
[257] F. Nelson Ford,et al. Information security: management's effect on culture and policy , 2006, Inf. Manag. Comput. Secur..
[258] Jason Lee,et al. The devil and packet trace anonymization , 2006, CCRV.
[259] William A. Arbaugh,et al. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data , 2006, USENIX Security Symposium.
[260] Henny B. Sipma,et al. What's Decidable About Arrays? , 2006, VMCAI.
[261] William A. Arbaugh,et al. FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..
[262] Ganesh Gopalakrishnan,et al. Exploiting Symmetry and Transactions for Partial Order Reduction of Rule Based Specifications , 2006, SPIN.
[263] Wenke Lee,et al. Secure and Flexible Monitoring of Virtual Machines , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[264] Daniele Sgandurra,et al. Building Trustworthy Intrusion Detection through VM Introspection , 2007, Third International Symposium on Information Assurance and Security.
[265] A. B. Ruighaver,et al. Organisational security culture: Extending the end-user perspective , 2007, Comput. Secur..
[266] Xuxian Jiang,et al. Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction , 2007, CCS '07.
[267] H. Raghav Rao,et al. Interorganizational information sharing in the airline industry: An analysis of stock market responses to code-sharing agreements , 2007, Inf. Syst. Frontiers.
[268] Hein S. Venter. New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa , 2007, SEC.
[269] Sushil Jajodia,et al. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[270] Viorica Sofronie-Stokkermans,et al. Applications of Hierarchical Reasoning in the Verification of Complex Systems , 2007, Electron. Notes Theor. Comput. Sci..
[271] Dirk Stephan Schweitzer. Symbolische Auswertung und Heuristiken zur Verifikation funktionaler Programme , 2007 .
[272] Ojelanki K. Ngwenyama,et al. THE CRITICAL SOCIAL THEORY APPROACH TO INFORMATION SYSTEMS: PROBLEMS AND CHALLENGES , 2007 .
[273] George Kandathil,et al. Contradictions of Employee Involvement, Information Sharing and Expectations: A Case Study of an Indian Worker Cooperative , 2007 .
[274] Shuchih Ernest Chang,et al. Exploring organizational culture for information security management , 2007, Ind. Manag. Data Syst..
[275] Mo Adam Mahmood,et al. Employees' Behavior towards IS Security Policy Compliance , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[276] Eric C. Price,et al. Browser-Based Attacks on Tor , 2007, Privacy Enhancing Technologies.
[277] Xuxian Jiang,et al. "Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots , 2007, RAID.
[278] Brendan Dolan-Gavitt,et al. The VAD tree: A process-eye view of physical memory , 2007, Digit. Investig..
[279] Nicholas Hopper,et al. How much anonymity does network latency leak? , 2007, TSEC.
[280] Martín Casado,et al. Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification , 2007, NSDI.
[281] Detmar W. Straub,et al. Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..
[282] Eirik Albrechtsen,et al. A qualitative study of users' view on information security , 2007, Comput. Secur..
[283] Charles V. Wright,et al. On Web Browsing Privacy in Anonymized NetFlows , 2007, USENIX Security Symposium.
[284] Mads Andre Bergdal,et al. Using virtual machines for integrity checking , 2007 .
[285] Charles V. Wright,et al. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces , 2007, NDSS.
[286] Hajime Inoue,et al. NetADHICT: A Tool for Understanding Network Traffic , 2007, LISA.
[287] Sushil Jajodia,et al. Measuring network security using dynamic bayesian network , 2008, QoP '08.
[288] Jessica Staddon,et al. Detecting privacy leaks using corpus-based association rules , 2008, KDD.
[289] David M. Nicol. Performance Analysis of Real Traffic Carried with Encrypted Cover Flows , 2008, 2008 22nd Workshop on Principles of Advanced and Distributed Simulation.
[290] HRM: A contributor to employee alienation? , 2008 .
[291] Qing Hu,et al. Top Management Championship and Individual Behaviour Towards Information Security: An Integrative Model , 2008, ECIS.
[292] Xuxian Jiang,et al. Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing , 2008, RAID.
[293] H. Raghav Rao,et al. Security analysis of Internet technology components enabling globally distributed workplaces—a framework , 2008, TOIT.
[294] David Wetherall,et al. Privacy oracle: a system for finding application leaks with black box differential testing , 2008, CCS.
[295] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[296] Viorica Sofronie-Stokkermans,et al. Interpolation in Local Theory Extensions , 2006, Log. Methods Comput. Sci..
[297] Angelos D. Keromytis,et al. Taming the Devil: Techniques for Evaluating Anonymized Network Data , 2008, NDSS.
[298] Zhu Jianming,et al. A Survivable Scheme for Critical Information System , 2008, 2008 International Conference on Security Technology.
[299] Joseph Migga Kizza,et al. Network Intrusion Detection Based on Bayesian Networks , 2008, SEKE.
[300] Shari Lawrence Pfleeger,et al. Insiders Behaving Badly , 2008, IEEE Security & Privacy.
[301] Stefano Paraboschi,et al. Bayesian-Networks-Based Misuse and Anomaly Prevention System , 2008, ICEIS.
[302] Saurabh Bagchi,et al. Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling , 2008, RAID.
[303] DEEPAK , Bombay Brokers.
[304] «Luca» , Regìa Parola Utopia.