A methodology for studying untrusted software. Sierra, J. M., Hernández Castro, J. C., Ribagorda, A., Ramos, B., & Muñoz Cuenca, A. LOGIN, The USENIX Official Magazine, 26(3):30–33, June, 2000. bibtex @article{ribagordaArticle16,
author = {Sierra, Jos{\'e} Mar{\'i}a and Hern{\'a}ndez Castro, Julio C{\'e}sar and Ribagorda, Arturo and Ramos, Benjam{\'i}n and Muñoz Cuenca, A.},
title = {A methodology for studying untrusted software},
journal = {LOGIN, The USENIX Official Magazine},
year = {2000},
month = {June},
volume = {26},
number = {3},
pages = {30--33},
}
Downloads: 0
{"_id":"SDxCvpwH2WPE3KBSC","bibbaseid":"sierra-hernndezcastro-ribagorda-ramos-muozcuenca-amethodologyforstudyinguntrustedsoftware-2000","downloads":0,"creationDate":"2018-11-06T10:44:23.254Z","title":"A methodology for studying untrusted software","author_short":["Sierra, J. M.","Hernández Castro, J. C.","Ribagorda, A.","Ramos, B.","Muñoz Cuenca, A."],"year":2000,"bibtype":"article","biburl":"http://cosec.inf.uc3m.es/publications.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Sierra"],"firstnames":["José","María"],"suffixes":[]},{"propositions":[],"lastnames":["Hernández","Castro"],"firstnames":["Julio","César"],"suffixes":[]},{"propositions":[],"lastnames":["Ribagorda"],"firstnames":["Arturo"],"suffixes":[]},{"propositions":[],"lastnames":["Ramos"],"firstnames":["Benjamín"],"suffixes":[]},{"propositions":[],"lastnames":["Muñoz","Cuenca"],"firstnames":["A."],"suffixes":[]}],"title":"A methodology for studying untrusted software","journal":"LOGIN, The USENIX Official Magazine","year":"2000","month":"June","volume":"26","number":"3","pages":"30–33","bibtex":"@article{ribagordaArticle16,\n author = {Sierra, Jos{\\'e} Mar{\\'i}a and Hern{\\'a}ndez Castro, Julio C{\\'e}sar and Ribagorda, Arturo and Ramos, Benjam{\\'i}n and Muñoz Cuenca, A.},\n title = {A methodology for studying untrusted software},\n journal = {LOGIN, The USENIX Official Magazine},\n year = {2000},\n month = {June},\n volume = {26},\n number = {3},\n pages = {30--33},\n}\n\n","author_short":["Sierra, J. M.","Hernández Castro, J. C.","Ribagorda, A.","Ramos, B.","Muñoz Cuenca, A."],"key":"ribagordaArticle16","id":"ribagordaArticle16","bibbaseid":"sierra-hernndezcastro-ribagorda-ramos-muozcuenca-amethodologyforstudyinguntrustedsoftware-2000","role":"author","urls":{},"downloads":0,"html":"","metadata":{"authorlinks":{"ribagorda, a":"https://cosec.inf.uc3m.es/"}}},"search_terms":["methodology","studying","untrusted","software","sierra","hernández castro","ribagorda","ramos","muñoz cuenca"],"keywords":[],"authorIDs":["5adf62ce47a78c1000000253","5df69a7e31a37ade01000026","5e0d5c7424d7cbdf01000040","5e1c51fee556c6de010000ba","5e2f639626e5cadf01000383","5e30271c7e0df1de010001aa","5e4a5a08cdaf71de010000bc","5e4eb958d9cddadf01000051","5e591f5b9bb6d2df01000185","5e60b4d4c28c0fde01000102","5e627acf11ac5fde0100028f","5e6666d646e828de01000240","CDdikpnurR5vxw8Be","DDd94goGitpEDE4SR","JMrtkNqCND59gXEHY","cuZgQ8Bk7GsP8AAmY","cwKM4eMp9KHdK9yPW","oBE2dan294BiJghrF","u8LWMX6Tx8ELRtbrd","wXWPtXeXkFzoiivgC"],"dataSources":["WKT8MGeKn3CKbZnTw","t43eqWqqcXw5QyLeA"]}