Technical Papers - 1998
September 1998
Intrusion Reaction Recommendations for Obtaining Reaction Capabilities Leonard J. LaPadula
NAS Flight Data Model Ronald A. Schwarz, Catherine N. Bolczak, Dr. Nels A. Broste, Carl E. Dahlke, Sally F. Stalnaker, Long K. Truong
August 1998
NIMS Information Security Threat Methodology Marshall D. Abrams
June 1998
When Systems are Simulations—T&E, VV&A, or Both? Michael Borowski, Priscilla Glasow
May 1998
Filtering Postures: Local Enforcement for Global Policies Joshua D. Guttman
A Theory of Granularity and Its Application to Problems of Polysemy and Underspecification of Meaning Inderjeet Mani
A Management Guide to Software Maintenance in COTS-Based Systems Judith A. Clapp, Audrey E. Taub
April 1998
Improving Software Quality Norms within Military Systems Robert A. Martin, Audrey E. Taub
March 1998
Visualization of Ground Target Designation from an Unmanned Aerial Vehicle Deborah J. Violette Pierce, John J. SantaPietro
January 1998
A Brief Overview of Nanoelectronic Devices James C. Ellenbogen
Technical Paper Archives 
|