Richard A. Smith. Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. In Paul B. Kantor, Gheorghe Muresan, Fred Roberts, Daniel Dajun Zeng, Fei-Yue Wang, Hsinchun Chen, Ralph C. Merkle, editors, Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings. Volume 3495 of Lecture Notes in Computer Science, pages 652-653, Springer, 2005. [doi]
@inproceedings{Smith05:34, title = {Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities}, author = {Richard A. Smith}, year = {2005}, doi = {10.1007/11427995_92}, url = {http://dx.doi.org/10.1007/11427995_92}, tags = {analysis, data-flow analysis}, researchr = {https://researchr.org/publication/Smith05%3A34}, cites = {0}, citedby = {0}, pages = {652-653}, booktitle = {Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred Roberts and Daniel Dajun Zeng and Fei-Yue Wang and Hsinchun Chen and Ralph C. Merkle}, volume = {3495}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-25999-6}, }