Conference Analysis of the Hardware Verification of the Honeywell SCOMP • IEEE Security and Privacy • 32-32 Gligor VD
Journal Article Anonymity Leakage in Private VoIP Networks • IEEE Transactions on Dependable and Secure Computing • 15(1):14-26 Shintre S, Gligor V, Barros JA
Journal Article Guest Editorial Vehicular Networks • IEEE Journal on Selected Areas in Communications • 25(8):1497-1500 Anjum F, Choi S, Gligor VD, Herrtwich RG, Hubaux J-P, Kumar PR, Shorey R, Lea C-T
Conference On denial-of-service in computer networks • Proceedings - International Conference on Data Engineering • 608-617 Gllgor VD
Conference On the Design and the Implementation of Secure Xenix Workstations • IEEE Security and Privacy • 102-102 Gligor VD, Burch EL, Chandersekaran GS, Chapman RS, Dotterer LJ, Hecht MS, Jiang WD, Luckenbaugh GL, Vasudevan N
Conference The VERUS™ Design Verification System • IEEE Security and Privacy • 150-150 Marick B, Gligor VD