The scientist’s investigation covers issues in Computer security, Software security assurance, Software, Information security and Security testing. The concepts of his Computer security study are interwoven with issues in Extensibility and Security information and event management. His work in Software security assurance tackles topics such as Software construction which are related to areas like Software quality and System testing.
Many of his research projects under Software are closely connected to Reuse with Reuse, tying the diverse disciplines of science together. His Security testing study combines topics from a wide range of disciplines, such as System integration testing, Security through obscurity, Software engineering and Regression testing. His studies deal with areas such as Security service and Database security as well as Security through obscurity.
His primary scientific interests are in Computer security, Silver bullet, Software security assurance, Software and Information security. His work deals with themes such as Government, Risk management and Internet privacy, which intersect with Computer security. He combines subjects such as Security information and event management, Computer security model and Software development with his study of Software security assurance.
His Software study frequently draws connections between related disciplines such as Engineering management. His Security service study combines topics in areas such as Security through obscurity and Cloud computing security. Gary McGraw has researched Security through obscurity in several fields, including Logical security, Security engineering and Asset.
His primary areas of study are Silver bullet, Computer security, Software security assurance, Internet privacy and Cryptography. His work in the fields of Computer security, such as Information security, intersects with other areas such as Work. The Information security study combines topics in areas such as Security information and event management, Cloud computing security and Security management.
His work carried out in the field of Software security assurance brings together such families of science as Capability Maturity Model, Software bug, Space, State and Deep learning. His research in Capability Maturity Model intersects with topics in Network security policy, Security convergence, Security through obscurity, Computer security model and Asset. Gary McGraw interconnects Encryption and Public-key cryptography in the investigation of issues within Cryptography.
Computer security, Software security assurance, Artificial intelligence, Machine learning and Silver bullet are his primary areas of study. He carries out multidisciplinary research, doing studies in Computer security and Work. His research on Software security assurance concerns the broader Cloud computing security.
His studies in Artificial intelligence integrate themes in fields like Risk analysis, Data modeling, Risk analysis, Software architecture and Risk assessment. His Machine learning research includes elements of Training set, Security engineering and Taxonomy. His Capability Maturity Model study combines topics from a wide range of disciplines, such as Certified Information Security Manager, Security service, Information security, Information security audit and Asset.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Software Security: Building Security In
ieee symposium on security and privacy (2004)
ITS4: a static vulnerability scanner for C and C++ code
J. Viega;J.T. Bloch;Y. Kohno;G. McGraw.
annual computer security applications conference (2000)
Security as a new dimension in embedded system design
Paul Kocher;Ruby Lee;Gary McGraw;Anand Raghunathan.
design automation conference (2004)
Building Secure Software: How to Avoid Security Problems the Right Way
John Viega;Gary McGraw.
Software fault injection: inoculating programs against errors
Jeffrey M. Voas;Gary McGraw.
Static analysis for security
B. Chess;G. McGraw.
ieee symposium on security and privacy (2004)
Exploiting Software: How to Break Code
Greg Hoglund;Gary McGraw.
Securing Java: getting down to business with mobile code
Gary McGraw;Edward W. Felten.
Attacking Malicious Code: A Report to the Infosec Research Council
Gary McGraw;Greg Morrisett.
IEEE Software (2000)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: