Search

Your search keyword '"Levitt, Karl N."' showing total 100 results

Search Constraints

Start Over You searched for: Author "Levitt, Karl N." Remove constraint Author: "Levitt, Karl N."
100 results on '"Levitt, Karl N."'

Search Results

1. Security Policy Specification Using a Graphical Approach

2. Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach

3. Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks

4. Learning Unknown Attacks — A Start

11. Network intrusion detection

15. MCF: a malicious code filter

17. Toward a formal verification of a floating-point coprocessor and its composition with a central processing unit

18. A Survey of Progress in Coding Theory in the Soviet Union. Final Report.

21. An Example of Hierarchical Design and Proof.

22. Proof Techniques for Hierarchically Structured Programs.

26. Helix: A Self-Regenerative Architecture for the Incorruptible Enterprise

28. Description of Projects Utilizing Equipment Purchased under the DURIP Award

30. Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.

40. Towards applying the composition principle to verify a microkernel operating system.

49. An Assessment of Techniques for Proving Program Correctness.

50. Survey of Fault Tolerant Computer Security and Computer Safety.

Catalog

Books, media, physical & digital resources