BibTeX records: Rayford B. Vaughn

download as .bib file

@inproceedings{DBLP:conf/csiirw/VaughnM16,
  author       = {Rayford B. Vaughn Jr. and
                  Tommy H. Morris},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  John R. Goodall and
                  Robert A. Bridges},
  title        = {Addressing Critical Industrial Control System Cyber Security Concerns
                  via High Fidelity Simulation},
  booktitle    = {Proceedings of the 11th Annual Cyber and Information Security Research
                  Conference, {CISRC} 2016, Oak Ridge, TN, USA, April 5-7, 2016},
  pages        = {12:1--12:4},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897795.2897819},
  doi          = {10.1145/2897795.2897819},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/VaughnM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ConklinVW16,
  author       = {Wm. Arthur Conklin and
                  Rayford B. Vaughn and
                  Gregory B. White},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Introduction to the Cybersecurity Minitrack},
  booktitle    = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
                  Koloa, HI, USA, January 5-8, 2016},
  pages        = {2615},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HICSS.2016.327},
  doi          = {10.1109/HICSS.2016.327},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ConklinVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WhiteCV15,
  author       = {Gregory B. White and
                  Wm. Arthur Conklin and
                  Rayford B. Vaughn},
  editor       = {Tung X. Bui and
                  Ralph H. Sprague Jr.},
  title        = {Introduction to the E-government Secure Cyberspace in 21st Century
                  Government Minitrack},
  booktitle    = {48th Hawaii International Conference on System Sciences, {HICSS} 2015,
                  Kauai, Hawaii, USA, January 5-8, 2015},
  pages        = {2252},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/HICSS.2015.269},
  doi          = {10.1109/HICSS.2015.269},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/WhiteCV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/ConklinWV14,
  author       = {Wm. Arthur Conklin and
                  Gregory B. White and
                  Rayford B. Vaughn},
  title        = {Introduction to Infrastructure Security Minitrack},
  booktitle    = {47th Hawaii International Conference on System Sciences, {HICSS} 2014,
                  Waikoloa, HI, USA, January 6-9, 2014},
  pages        = {1986},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/HICSS.2014.251},
  doi          = {10.1109/HICSS.2014.251},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/ConklinWV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/MorrisVS13,
  author       = {Thomas H. Morris and
                  Rayford B. Vaughn and
                  Elena Sitnikova},
  editor       = {Clark D. Thomborson and
                  Udaya Parampalli},
  title        = {Advances in the Protection of Critical Infrastructure by Improvement
                  in Industrial Control System Security},
  booktitle    = {Eleventh Australasian Information Security Conference, {AISC} 2013,
                  Adelaide, Australia, February 2013},
  series       = {{CRPIT}},
  volume       = {138},
  pages        = {67--76},
  publisher    = {Australian Computer Society},
  year         = {2013},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV138Morris.html},
  timestamp    = {Thu, 25 Jul 2019 14:09:43 +0200},
  biburl       = {https://dblp.org/rec/conf/auisc/MorrisVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/VaughnMS13,
  author       = {Rayford B. Vaughn and
                  Thomas H. Morris and
                  Elena Sitnikova},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Development {\&} expansion of an industrial control system security
                  laboratory and an international research collaboration},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2459997},
  doi          = {10.1145/2459976.2459997},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/VaughnMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/VaughnCW13,
  author       = {Rayford B. Vaughn Jr. and
                  Wm. Arthur Conklin and
                  Gregory B. White},
  title        = {Introduction to E-Government Infrastructure Security Minitrack},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {1753},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.345},
  doi          = {10.1109/HICSS.2013.345},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/VaughnCW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MorrisJVD13,
  author       = {Thomas H. Morris and
                  Bryan A. Jones and
                  Rayford B. Vaughn and
                  Yoginder S. Dandass},
  title        = {Deterministic Intrusion Detection Rules for {MODBUS} Protocols},
  booktitle    = {46th Hawaii International Conference on System Sciences, {HICSS} 2013,
                  Wailea, HI, USA, January 7-10, 2013},
  pages        = {1773--1781},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/HICSS.2013.174},
  doi          = {10.1109/HICSS.2013.174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/MorrisJVD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-8/SitnikovaFV13,
  author       = {Elena Sitnikova and
                  Ernest Foo and
                  Rayford B. Vaughn},
  editor       = {Ronald C. Dodge Jr. and
                  Lynn Futcher},
  title        = {The Power of Hands-On Exercises in {SCADA} Cyber Security Education},
  booktitle    = {Information Assurance and Security Education and Training - 8th {IFIP}
                  {WG} 11.8 World Conference on Information Security Education, {WISE}
                  8, Auckland, New Zealand, July 8-10, 2013, Proceedings, {WISE} 7,
                  Lucerne Switzerland, June 9-10, 2011, and {WISE} 6, Bento Gon{\c{c}}alves,
                  RS, Brazil, July 27-31, 2009, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {406},
  pages        = {83--94},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39377-8\_9},
  doi          = {10.1007/978-3-642-39377-8\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-8/SitnikovaFV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/MorrisVD12,
  author       = {Thomas H. Morris and
                  Rayford B. Vaughn and
                  Yoginder S. Dandass},
  title        = {A Retrofit Network Intrusion Detection System for {MODBUS} {RTU} and
                  {ASCII} Industrial Control Systems},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {2338--2345},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.78},
  doi          = {10.1109/HICSS.2012.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/MorrisVD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MorrisVD11,
  author       = {Thomas H. Morris and
                  Rayford B. Vaughn and
                  Yoginder S. Dandass},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {A testbed for {SCADA} control system cybersecurity research and pedagogy},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {27},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179327},
  doi          = {10.1145/2179298.2179327},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/MorrisVD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/BogenDVRAC10,
  author       = {Alfred C. Bogen and
                  David A. Dampier and
                  Rayford B. Vaughn and
                  Donna S. Reese and
                  Edward B. Allen and
                  Jeffrey C. Carver},
  title        = {Structured Forensics Examination Planning with Domain Modeling: {A}
                  Report of Three Experiment Trials},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {3},
  number       = {1},
  pages        = {23--32},
  year         = {2010},
  url          = {https://doi.org/10.1080/15567280903376896},
  doi          = {10.1080/15567280903376896},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/BogenDVRAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/HulittV10,
  author       = {Elaine Hulitt and
                  Rayford B. Vaughn},
  title        = {Information system security compliance to {FISMA} standard: a quantitative
                  measure},
  journal      = {Telecommun. Syst.},
  volume       = {45},
  number       = {2-3},
  pages        = {139--152},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11235-009-9248-8},
  doi          = {10.1007/S11235-009-9248-8},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/HulittV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isca/VaughnD09,
  author       = {Rayford B. Vaughn and
                  David A. Dampier},
  title        = {Outreach, Teaching and Research Facilitated by a Forensics Training
                  Center in Direct Support of Public Safety and Criminal Justice},
  journal      = {Int. J. Comput. Their Appl.},
  volume       = {16},
  number       = {2},
  pages        = {105--110},
  year         = {2009},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isca/VaughnD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/McGrewV09,
  author       = {Robert Wesley McGrew and
                  Rayford B. Vaughn},
  title        = {Discovering vulnerabilities in control system human-machine interface
                  software},
  journal      = {J. Syst. Softw.},
  volume       = {82},
  number       = {4},
  pages        = {583--589},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jss.2008.12.049},
  doi          = {10.1016/J.JSS.2008.12.049},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/McGrewV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/haisa/HulittV09,
  author       = {Elaine Hulitt and
                  Rayford B. Vaughn},
  editor       = {Steven Furnell and
                  Nathan L. Clarke},
  title        = {Information System Security Compliance to {FISMA} Standard: {A} Quantitative
                  Measure},
  booktitle    = {3rd International Conference on Human Aspects of Information Security
                  and Assurance, {HAISA} 2009, Athens, Greece, June 25-26, 2009. Proceedings},
  pages        = {82--96},
  publisher    = {University of Plymouth},
  year         = {2009},
  url          = {http://www.cscan.org/openaccess/?paperid=57},
  timestamp    = {Tue, 06 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/haisa/HulittV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/VaughnD09,
  author       = {Rayford B. Vaughn and
                  David A. Dampier},
  title        = {A Discovery Learning Approach to Information Assurance Education},
  booktitle    = {42st Hawaii International International Conference on Systems Science
                  {(HICSS-42} 2009), Proceedings {(CD-ROM} and online), 5-8 January
                  2009, Waikoloa, Big Island, HI, {USA}},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/HICSS.2009.10},
  doi          = {10.1109/HICSS.2009.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/VaughnD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/RileyDV08,
  author       = {Jack Wesley Riley and
                  David A. Dampier and
                  Rayford B. Vaughn},
  title        = {A Comparison of Forensic Hard Drive Imagers: {A} Time Analysis Comparison
                  Between the {ICS} Image MASSter-Solo {III} and the Logicube Talon},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {2},
  number       = {2},
  pages        = {74--82},
  year         = {2008},
  url          = {https://doi.org/10.1080/15567280802047143},
  doi          = {10.1080/15567280802047143},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/RileyDV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/RileyDV08,
  author       = {Jack Wesley Riley and
                  David A. Dampier and
                  Rayford B. Vaughn},
  editor       = {Indrajit Ray and
                  Sujeet Shenoi},
  title        = {Time Analysis of Hard Drive Imaging Tools},
  booktitle    = {Advances in Digital Forensics IV, Fourth Annual {IFIP} {WG} 11.9 Conference
                  on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30,
                  2008},
  series       = {{IFIP}},
  volume       = {285},
  pages        = {335--344},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-84927-0\_26},
  doi          = {10.1007/978-0-387-84927-0\_26},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/RileyDV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imcsit/HulittV08,
  author       = {Elaine Hulitt and
                  Rayford B. Vaughn},
  title        = {Information system security compliance to {FISMA} standard: {A} quantitative
                  measure},
  booktitle    = {Proceedings of the International Multiconference on Computer Science
                  and Information Technology, {IMCSIT} 2008, Wisla, Poland, 20-22 October
                  2008},
  pages        = {799--806},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IMCSIT.2008.4747334},
  doi          = {10.1109/IMCSIT.2008.4747334},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imcsit/HulittV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/Vaughn07,
  author       = {Rayford B. Vaughn},
  title        = {Leadership by example: {A} perspective on the influence of Barry Boehm},
  journal      = {J. Syst. Softw.},
  volume       = {80},
  number       = {8},
  pages        = {1222--1226},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jss.2006.09.045},
  doi          = {10.1016/J.JSS.2006.09.045},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/Vaughn07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caine/SirajV07,
  author       = {Ambareen Siraj and
                  Rayford B. Vaughn},
  editor       = {Gongzhu Hu},
  title        = {Sensor Corroboration for Anomaly Sensors in an Intrusion Detection
                  Environment},
  booktitle    = {Proceedings of the {ISCA} 20th International Conference on Computer
                  Applications in Industry and Engineering, {CAINE} 2007, November 7-9,
                  2007, San Francisco, California, {USA}},
  pages        = {278--283},
  publisher    = {{ISCA}},
  year         = {2007},
  timestamp    = {Tue, 29 Jan 2008 07:45:48 +0100},
  biburl       = {https://dblp.org/rec/conf/caine/SirajV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caine/LiV07,
  author       = {Wei Li and
                  Rayford B. Vaughn},
  editor       = {Gongzhu Hu},
  title        = {Efficient Update on Exploitation Graphs for Vulnerability Analysis},
  booktitle    = {Proceedings of the {ISCA} 20th International Conference on Computer
                  Applications in Industry and Engineering, {CAINE} 2007, November 7-9,
                  2007, San Francisco, California, {USA}},
  pages        = {295--300},
  publisher    = {{ISCA}},
  year         = {2007},
  timestamp    = {Mon, 28 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/caine/LiV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/VaughnD07,
  author       = {Rayford B. Vaughn and
                  David A. Dampier},
  title        = {Digital Forensics--State of the Science and Foundational Research
                  Activity},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {263},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.174},
  doi          = {10.1109/HICSS.2007.174},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/VaughnD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/VaughnD07a,
  author       = {Rayford B. Vaughn and
                  David A. Dampier},
  title        = {The Development of a University-Based Forensics Training Center as
                  a Regional Outreach and Service Activity},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {265},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.523},
  doi          = {10.1109/HICSS.2007.523},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/VaughnD07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/McRaeV07,
  author       = {Craig M. McRae and
                  Rayford B. Vaughn},
  title        = {Phighting the Phisher: Using Web Bugs and Honeytokens to Investigate
                  the Source of Phishing Attacks},
  booktitle    = {40th Hawaii International International Conference on Systems Science
                  {(HICSS-40} 2007), {CD-ROM} / Abstracts Proceedings, 3-6 January 2007,
                  Waikoloa, Big Island, HI, {USA}},
  pages        = {270},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HICSS.2007.435},
  doi          = {10.1109/HICSS.2007.435},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/McRaeV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-9/McGrewV07,
  author       = {Robert McGrew and
                  Rayford B. Vaughn},
  editor       = {Philip Craiger and
                  Sujeet Shenoi},
  title        = {Using Search Engines to Acquire Network Forensic Evidence},
  booktitle    = {Advances in Digital Forensics {III} - {IFIP} International Conference
                  on Digital Forensics, National Centre for Forensic Science, Orlando,
                  Florida, USA, January 28-31, 2007},
  series       = {{IFIP}},
  volume       = {242},
  pages        = {247--253},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-73742-3\_17},
  doi          = {10.1007/978-0-387-73742-3\_17},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-9/McGrewV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfp/McRaeMV06,
  author       = {Craig M. McRae and
                  Robert Wesley McGrew and
                  Rayford B. Vaughn},
  title        = {Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating
                  Phishing Scams},
  journal      = {J. Digit. Forensic Pract.},
  volume       = {1},
  number       = {3},
  pages        = {193--199},
  year         = {2006},
  url          = {https://doi.org/10.1080/15567280600995857},
  doi          = {10.1080/15567280600995857},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfp/McRaeMV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simulation/LiVD06,
  author       = {Wei Li and
                  Rayford B. Vaughn and
                  Yoginder S. Dandass},
  title        = {An Approach to Model Network Exploitations Using Exploitation Graphs},
  journal      = {Simul.},
  volume       = {82},
  number       = {8},
  pages        = {523--541},
  year         = {2006},
  url          = {https://doi.org/10.1177/0037549706072046},
  doi          = {10.1177/0037549706072046},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/simulation/LiVD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccgrid/LiV06,
  author       = {Wei Li and
                  Rayford B. Vaughn},
  title        = {Cluster Security Research Involving the Modeling of Network Exploitations
                  Using Exploitation Graphs},
  booktitle    = {Sixth {IEEE} International Symposium on Cluster Computing and the
                  Grid (CCGrid 2006), 16-19 May 2006, Singapore},
  pages        = {26},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CCGRID.2006.128},
  doi          = {10.1109/CCGRID.2006.128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccgrid/LiV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/MonroyV06,
  author       = {Cesar Monroy and
                  Rayford B. Vaughn},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Keeping An Educational Network Healthy: Differentiating Malicious
                  And Naive Students On An Educational Network Environment},
  booktitle    = {Proceedings of the 2006 International Conference on Security {\&}
                  Management, {SAM} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {475--481},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Wed, 06 Dec 2006 10:51:51 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/MonroyV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LiV06,
  author       = {Wei Li and
                  Rayford B. Vaughn},
  title        = {Modeling and Simulating System Exploitations through Exploitation
                  Graphs for Security Engineering},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.353},
  doi          = {10.1109/HICSS.2006.353},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LiV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/McGrewV06,
  author       = {Robert McGrew and
                  Rayford B. Vaughn},
  title        = {Experiences with Honeypot Systems: Development, Deployment, and Analysis},
  booktitle    = {39th Hawaii International International Conference on Systems Science
                  {(HICSS-39} 2006), {CD-ROM} / Abstracts Proceedings, 4-7 January 2006,
                  Kauai, HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/HICSS.2006.172},
  doi          = {10.1109/HICSS.2006.172},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/McGrewV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/serp/WilliamsCV06,
  author       = {Byron J. Williams and
                  Jeffrey C. Carver and
                  Rayford B. Vaughn},
  editor       = {Hamid R. Arabnia and
                  Hassan Reza},
  title        = {Change Risk Assessment: Understanding Risks Involved in Changing Software
                  Requirements},
  booktitle    = {Proceedings of the International Conference on Software Engineering
                  Research and Practice {\&} Conference on Programming Languages
                  and Compilers, {SERP} 2006, Las Vegas, Nevada, USA, June 26-29, 2006,
                  Volume 2},
  pages        = {966--971},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/serp/WilliamsCV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/FlorezLBSV05,
  author       = {German Florez and
                  Zhen Liu and
                  Susan M. Bridges and
                  Anthony Skjellum and
                  Rayford B. Vaughn},
  title        = {Lightweight monitoring of {MPI} programs in real time},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {17},
  number       = {13},
  pages        = {1547--1578},
  year         = {2005},
  url          = {https://doi.org/10.1002/cpe.889},
  doi          = {10.1002/CPE.889},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/FlorezLBSV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/KudikyalaV05,
  author       = {Udai Kumar Kudikyala and
                  Rayford B. Vaughn},
  title        = {Software requirement understanding using Pathfinder networks: discovering
                  and evaluating mental models},
  journal      = {J. Syst. Softw.},
  volume       = {74},
  number       = {1},
  pages        = {101--108},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jss.2003.09.028},
  doi          = {10.1016/J.JSS.2003.09.028},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/KudikyalaV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/SirajV05,
  author       = {Ambareen Siraj and
                  Rayford B. Vaughn},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {A Cognitive Model for Alert Correlation in a Distributed Environment},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {218--230},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_18},
  doi          = {10.1007/11427995\_18},
  timestamp    = {Fri, 18 Oct 2019 12:58:35 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/SirajV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Florez-LarrahondoBV05,
  author       = {German Florez{-}Larrahondo and
                  Susan M. Bridges and
                  Rayford B. Vaughn},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Efficient Modeling of Discrete Events for Anomaly Detection Using
                  Hidden Markov Models},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {506--514},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_38},
  doi          = {10.1007/11556992\_38},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Florez-LarrahondoBV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/LiuBV05,
  author       = {Zhen Liu and
                  Susan M. Bridges and
                  Rayford B. Vaughn},
  title        = {Combining Static Analysis and Dynamic Learning to Build Accurate Intrusion
                  Detection Models},
  booktitle    = {Proceedings of the 3rd {IEEE} International Workshop on Information
                  Assurance {(IWIA} 2005), 23-24 March 2005, College Park, MD, {USA}},
  pages        = {164--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IWIA.2005.6},
  doi          = {10.1109/IWIA.2005.6},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/LiuBV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitdm/SirajVB04,
  author       = {Ambareen Siraj and
                  Rayford B. Vaughn and
                  Susan M. Bridges},
  title        = {Decision Making For Network Health Assessment In An Intelligent Intrusion
                  Detection System Architecture},
  journal      = {Int. J. Inf. Technol. Decis. Mak.},
  volume       = {3},
  number       = {2},
  pages        = {281--306},
  year         = {2004},
  url          = {https://doi.org/10.1142/S0219622004001057},
  doi          = {10.1142/S0219622004001057},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijitdm/SirajVB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdim/FlorezLBVS04,
  author       = {German Florez and
                  Zhen Liu and
                  Susan Bridges and
                  Rayford B. Vaughn and
                  Anthony Skjellum},
  title        = {Detecting Anomalies in High-Performance Parallel Programs},
  journal      = {J. Digit. Inf. Manag.},
  volume       = {2},
  number       = {2},
  pages        = {44--47},
  year         = {2004},
  url          = {http://www.dirf.org/jdim/abstractv2i2.htm\#1},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdim/FlorezLBVS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/SirajVB04,
  author       = {Ambareen Siraj and
                  Rayford B. Vaughn and
                  Susan Bridges},
  title        = {Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection
                  System Architecture},
  booktitle    = {37th Hawaii International Conference on System Sciences {(HICSS-37}
                  2004), {CD-ROM} / Abstracts Proceedings, 5-8 January 2004, Big Island,
                  HI, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/HICSS.2004.1265658},
  doi          = {10.1109/HICSS.2004.1265658},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/SirajVB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/FlorezLBVS04,
  author       = {German Florez and
                  Zhen Liu and
                  Susan Bridges and
                  Rayford B. Vaughn and
                  Anthony Skjellum},
  title        = {Detecting Anomalies in High-Performance Parallel Programs},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {30--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286585},
  doi          = {10.1109/ITCC.2004.1286585},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/FlorezLBVS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/Vaughn03,
  author       = {Rayford B. Vaughn},
  title        = {Advances in the provisions of system and software security - Thirty
                  years of progress},
  journal      = {Adv. Comput.},
  volume       = {58},
  pages        = {287--340},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0065-2458(03)58007-X},
  doi          = {10.1016/S0065-2458(03)58007-X},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/Vaughn03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzIEEE/LiuBV03,
  author       = {Zhen Liu and
                  Susan M. Bridges and
                  Rayford B. Vaughn},
  title        = {Classification of anomalous traces of privileged and parallel programs
                  by neural networks},
  booktitle    = {The 12th {IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE}
                  2003, St. Louis, Missouri, USA, 25-28 May 2003},
  pages        = {1225--1230},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/FUZZ.2003.1206606},
  doi          = {10.1109/FUZZ.2003.1206606},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzIEEE/LiuBV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/VaughnHS03,
  author       = {Rayford B. Vaughn and
                  Ronda R. Henning and
                  Ambareen Siraj},
  title        = {Information Assurance Measures and Metrics - State of Practice and
                  Proposed Taxonomy},
  booktitle    = {36th Hawaii International Conference on System Sciences {(HICSS-36}
                  2003), {CD-ROM} / Abstracts Proceedings, January 6-9, 2003, Big Island,
                  HI, {USA}},
  pages        = {331},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/HICSS.2003.1174904},
  doi          = {10.1109/HICSS.2003.1174904},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/VaughnHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-8/Vaughn03,
  author       = {Rayford B. Vaughn},
  editor       = {Cynthia E. Irvine and
                  Helen L. Armstrong},
  title        = {Panel: Teaching Undergraduate Information Assurance},
  booktitle    = {Security Education and Critical Infrastructures, {IFIP} {TC11} / {WG11.8}
                  Third Annual World Conference on Information Security Education (WISE3),
                  June 26-28, 2003, Monterey, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {253},
  pages        = {173--174},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Thu, 06 May 2004 14:39:20 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip11-8/Vaughn03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/HossainBV03,
  author       = {Mahmood Hossain and
                  Susan M. Bridges and
                  Rayford B. Vaughn Jr.},
  title        = {Adaptive intrusion detection with data mining},
  booktitle    = {Proceedings of the {IEEE} International Conference on Systems, Man
                  {\&} Cybernetics: Washington, D.C., USA, 5-8 October 2003},
  pages        = {3097--3103},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICSMC.2003.1244366},
  doi          = {10.1109/ICSMC.2003.1244366},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smc/HossainBV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/VaughnHF02,
  author       = {Rayford B. Vaughn and
                  Ronda R. Henning and
                  Kevin L. Fox},
  title        = {An empirical study of industrial security-engineering practices},
  journal      = {J. Syst. Softw.},
  volume       = {61},
  number       = {3},
  pages        = {225--232},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0164-1212(01)00150-9},
  doi          = {10.1016/S0164-1212(01)00150-9},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/VaughnHF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csee/HislopLVU02,
  author       = {Gregory W. Hislop and
                  Michael J. Lutz and
                  Rayford B. Vaughn and
                  David A. Umphress},
  title        = {Panel 1: Changing Conditions for Undergraduate Software Engineering
                  Programs},
  booktitle    = {15th Conference on Software Engineering Education and Training (CSEET'02),
                  25-27 February 2002, Covington, Kentucky, {USA}},
  pages        = {250--251},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSEE.2002.995217},
  doi          = {10.1109/CSEE.2002.995217},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csee/HislopLVU02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csedu/Vaughn01,
  author       = {Rayford B. Vaughn},
  title        = {Teaching Industrial Practices in an Undergraduate Software Engineering
                  Course},
  journal      = {Comput. Sci. Educ.},
  volume       = {11},
  number       = {1},
  pages        = {21--32},
  year         = {2001},
  url          = {https://doi.org/10.1076/csed.11.1.21.3844},
  doi          = {10.1076/CSED.11.1.21.3844},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csedu/Vaughn01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csee/Vaughn00,
  author       = {Rayford B. Vaughn},
  title        = {A Report on Industrial Transfer of Software Engineering to the Classroom
                  Environment},
  booktitle    = {Thirteenth Conference on Software Engineering Education and Training,
                  6-8 March, 2000, Austin, Texas, {USA}},
  pages        = {15--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSEE.2000.827013},
  doi          = {10.1109/CSEE.2000.827013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csee/Vaughn00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/Vaughn00,
  author       = {Rayford B. Vaughn},
  editor       = {Lillian (Boots) Cassel and
                  Nell B. Dale and
                  Henry MacKay Walker and
                  Susan M. Haller},
  title        = {Application of security tot he computing science classroom},
  booktitle    = {Proceedings of the 31st {SIGCSE} Technical Symposium on Computer Science
                  Education, {SIGCSE} 2000, Austin, Texas, USA, March 7-12, 2000},
  pages        = {90--94},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/330908.331822},
  doi          = {10.1145/330908.331822},
  timestamp    = {Tue, 23 Mar 2021 10:54:19 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcse/Vaughn00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/VaughnB99,
  author       = {Rayford B. Vaughn and
                  Julian E. Boggess III},
  title        = {Integration of computer security into the software engineering and
                  computer science programs},
  journal      = {J. Syst. Softw.},
  volume       = {49},
  number       = {2-3},
  pages        = {149--153},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0164-1212(99)00088-6},
  doi          = {10.1016/S0164-1212(99)00088-6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/VaughnB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BurnhamIRSV99,
  author       = {Ron Ross and
                  Cynthia E. Irvine and
                  Charles Reynolds and
                  Ravi S. Sandhu and
                  Blaine Burnham and
                  Rayford B. Vaughn},
  title        = {Information Security Education for the Next Millennium: Building the
                  Next Generation of Practitioners (Forum)},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {265},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.1999.10007},
  doi          = {10.1109/ACSAC.1999.10007},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BurnhamIRSV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/VaughnSU94,
  author       = {Rayford B. Vaughn and
                  Hossein Saiedian and
                  Elizabeth A. Unger},
  title        = {A Proposed Mechanism for Implementation of Non-Discretionary Access
                  Controls in a Network Environment},
  journal      = {Comput. Networks {ISDN} Syst.},
  volume       = {26},
  number       = {12},
  pages        = {1523--1531},
  year         = {1994},
  url          = {https://doi.org/10.1016/0169-7552(94)90026-4},
  doi          = {10.1016/0169-7552(94)90026-4},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/VaughnSU94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VaughnSU93,
  author       = {Rayford B. Vaughn and
                  Hossein Saiedian and
                  Elizabeth A. Unger},
  title        = {A survey of security issues in office computation and the application
                  of secure computing models to office systems},
  journal      = {Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {79--97},
  year         = {1993},
  url          = {https://doi.org/10.1016/0167-4048(93)90014-V},
  doi          = {10.1016/0167-4048(93)90014-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VaughnSU93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics