Reducing Software Security Risk through an Integrated Approach. Gilliam, D. P., Kelly, J. C., & Bishop, M. In WETICE, pages 141-146, 2000. IEEE Computer Society. Link Paper bibtex @inproceedings{ conf/wetice/GilliarnKB00,
added-at = {2015-08-06T00:00:00.000+0200},
author = {Gilliam, David P. and Kelly, John C. and Bishop, Matt},
biburl = {http://www.bibsonomy.org/bibtex/2d96d3f7be9181b32414a53d0774c61f0/dblp},
booktitle = {WETICE},
crossref = {conf/wetice/2000},
ee = {http://doi.ieeecomputersociety.org/10.1109/WETICE.2000.10000},
interhash = {0455e16de6186d562e82ba97ef0079b8},
intrahash = {d96d3f7be9181b32414a53d0774c61f0},
isbn = {0-7695-0798-0},
keywords = {dblp},
pages = {141-146},
publisher = {IEEE Computer Society},
title = {Reducing Software Security Risk through an Integrated Approach.},
url = {http://dblp.uni-trier.de/db/conf/wetice/wetice2000.html#GilliarnKB00},
year = {2000}
}
Downloads: 0
{"_id":"sXg93ykXwsrcsP8ya","bibbaseid":"gilliam-kelly-bishop-reducingsoftwaresecurityriskthroughanintegratedapproach-2000","downloads":0,"creationDate":"2015-09-08T15:38:37.547Z","title":"Reducing Software Security Risk through an Integrated Approach.","author_short":["Gilliam, D.<nbsp>P.","Kelly, J.<nbsp>C.","Bishop, M."],"year":2000,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/john?items=1000","bibdata":{"added-at":"2015-08-06T00:00:00.000+0200","author":["Gilliam, David P.","Kelly, John C.","Bishop, Matt"],"author_short":["Gilliam, D.<nbsp>P.","Kelly, J.<nbsp>C.","Bishop, M."],"bibtex":"@inproceedings{ conf/wetice/GilliarnKB00,\n added-at = {2015-08-06T00:00:00.000+0200},\n author = {Gilliam, David P. and Kelly, John C. and Bishop, Matt},\n biburl = {http://www.bibsonomy.org/bibtex/2d96d3f7be9181b32414a53d0774c61f0/dblp},\n booktitle = {WETICE},\n crossref = {conf/wetice/2000},\n ee = {http://doi.ieeecomputersociety.org/10.1109/WETICE.2000.10000},\n interhash = {0455e16de6186d562e82ba97ef0079b8},\n intrahash = {d96d3f7be9181b32414a53d0774c61f0},\n isbn = {0-7695-0798-0},\n keywords = {dblp},\n pages = {141-146},\n publisher = {IEEE Computer Society},\n title = {Reducing Software Security Risk through an Integrated Approach.},\n url = {http://dblp.uni-trier.de/db/conf/wetice/wetice2000.html#GilliarnKB00},\n year = {2000}\n}","bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bibtex/2d96d3f7be9181b32414a53d0774c61f0/dblp","booktitle":"WETICE","crossref":"conf/wetice/2000","ee":"http://doi.ieeecomputersociety.org/10.1109/WETICE.2000.10000","id":"conf/wetice/GilliarnKB00","interhash":"0455e16de6186d562e82ba97ef0079b8","intrahash":"d96d3f7be9181b32414a53d0774c61f0","isbn":"0-7695-0798-0","key":"conf/wetice/GilliarnKB00","keywords":"dblp","pages":"141-146","publisher":"IEEE Computer Society","title":"Reducing Software Security Risk through an Integrated Approach.","type":"inproceedings","url":"http://dblp.uni-trier.de/db/conf/wetice/wetice2000.html#GilliarnKB00","year":"2000","bibbaseid":"gilliam-kelly-bishop-reducingsoftwaresecurityriskthroughanintegratedapproach-2000","role":"author","urls":{"Link":"http://doi.ieeecomputersociety.org/10.1109/WETICE.2000.10000","Paper":"http://dblp.uni-trier.de/db/conf/wetice/wetice2000.html#GilliarnKB00"},"keyword":["dblp"],"downloads":0},"search_terms":["reducing","software","security","risk","through","integrated","approach","gilliam","kelly","bishop"],"keywords":["dblp"],"authorIDs":[],"dataSources":["e3DPfiLXyfZxic3k2"]}