Export 300 results:
Goldman RP, Kong D, Mankins D, Schwartz B, Spicuzza D, Zatko PMudge, Strayer T, Milliken W, Watro R, Heimerdinger W et al..  2009.  An Architecture for Scalable Network Defense.
Payne C, O’Brien R, Haigh J.T.  2009.  The Case for Prevention-based, Host-resident Defenses in the Modern PCS Network.
Easwarin A, Lee I, Sokolsky O, Vestal S.  2009.  A Compositional Scheduling Framework for Digital Avionics Systems. IEEE Real-Time Computing Systems and Applications.
Bonasso R.P., Boddy M, Kortenkamp D.  2009.  Enhancing NASA’s Procedure Representation Language to Support Planning Operations.
Goldman RP, Harp S.  2009.  Model-based Intrusion Assessment in Common Lisp.
Michalowski W., Wilk S., Sayyad-Shirabad J., Kuziemsky C., O’Sullivan D., Farion K., Michalowski M.  2009.  Modeling Clinical Practice Guidelines using Predicate Logic for Reasoning with Incomplete Patient’s Data. 20th International Conference on Multiple Criteria Decision Making, Chengdu China (2009).
Bonasso R.P., Boddy M, Kortenkamp D, Bell S.  2009.  Ontological Models to Support Planning Operations. International Workshop on Planning and Scheduling for Space (IWPSS).
Isle B, Freeman R, Glantz C, Stoddard M, Melton R, Hester MS, Sands C, Muehrcke C, Morgen MC, Coles G.  2009.  Summary of SCADA Cyber Self-Assessment Working Group.
Haigh J.T, Harp S, O’Brien R, Payne C, Gohde J, Maraist J.  2009.  Trapping Malicious Insiders in the SPDR Web.
Schwerdfeger A, Van Wyk ER.  2009.  Verifiable Composition of Deterministic Grammars. ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).
Schwerdfeger A, Van Wyk E.  2009.  Verifiable Parse Table Composition for Deterministic Parsing. 2nd International Conference on Software Language Engineering.
O’Brien R, Payne C.  2009.  Virtual Private Groups for Protecting Critical Infrastructure Networks.