Journal Article Detecting illicit leakage of information in operating systems • Journal of Computer Security • 4(2-3):123-148 Shieh S-P, Gligor VD
Journal Article Guest Editorial Vehicular Networks • IEEE Journal on Selected Areas in Communications • 25(8):1497-1500 Anjum F, Choi S, Gligor VD, Herrtwich RG, Hubaux J-P, Kumar PR, Shorey R, Lea C-T
Conference On denial-of-service in computer networks • Proceedings - International Conference on Data Engineering • 608-617 Gllgor VD
Journal Article On Inter-Realm Authentication in Large Distributed Systems • Journal of Computer Security • 2(2-3):137-157 Gligor VD, Luan S-W, Pato JN
Conference On the Design and the Implementation of Secure Xenix Workstations • IEEE Security and Privacy • 102-102 Gligor VD, Burch EL, Chandersekaran GS, Chapman RS, Dotterer LJ, Hecht MS, Jiang WD, Luckenbaugh GL, Vasudevan N
Conference The VERUS™ Design Verification System • IEEE Security and Privacy • 150-150 Marick B, Gligor VD
Journal Article Towards a Theory of Penetration-Resistant Systems and Its Applications • Journal of Computer Security • 1(2):133-158 Gupta S, Gligor VD