Landwehr, John
24  results:
Search for persons X
?
2

Testing, Instrumentation, and Results to make the world's f..:

, In: 2020 IEEE Research and Applications of Photonics in Defense Conference (RAPID),
 
?
3

Fabrication, Evaluation, and Improvements of 1K×1K and 2K×2..:

, In: 2019 IEEE Research and Applications of Photonics in Defense Conference (RAPID),
 
?
4

Cyberinfrastructure and education:

, In: Proceedings of the 2006 ACM/IEEE conference on Supercomputing,
Connolly, John ; Landwehr, Elaine - p. 21-es , 2006
 
?
 
?
 
?
11

A taxonomy of computer program security flaws:

Landwehr, Carl E. ; Bull, Alan R. ; McDermott, John P..
ACM Computing Surveys (CSUR).  26 (1994)  3 - p. 211-254 , 1994
 
?
12

NRL invitational workshop on testing and proving : two a..:

Landwehr, Carl E. ; Gerhart, Susan L. ; McLean, John..
ACM SIGSOFT Software Engineering Notes.  11 (1986)  5 - p. 63-85 , 1986
 
?
13

A security model for military message systems:

Landwehr, Carl E. ; Heitmeyer, Constance L. ; McLean, John
ACM Transactions on Computer Systems (TOCS).  2 (1984)  3 - p. 198-222 , 1984
 
?
14

Hardware Requirements for Secure Computer Systems: A Framew..:

, In: 1984 IEEE Symposium on Security and Privacy,
Landwehr, Carl E. ; Carroll, John M. - p. 34-34 , 1984
 
?
15

A security model for military message systems:

Landwehr, Carl E. ; Heitmeyer, Constance L. ; McLean, John
ACM Transactions on Computer Systems.  2 (1984)  3 - p. 198-222 , 1984
 
1-15