Entry Gurbani:2007:EAB from bstj2000.bib
Last update: Sun Oct 15 02:05:00 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Gurbani:2007:EAB,
author = "Vijay K. Gurbani and Andrew R. McGee",
title = "An early application of the {Bell Labs Security}
framework to analyze vulnerabilities in the {Internet}
telephony domain",
journal = j-BELL-LABS-TECH-J,
volume = "12",
number = "3",
pages = "7--19",
month = "Autumn",
year = "2007",
CODEN = "BLTJFD",
DOI = "https://doi.org/10.1002/bltj.20246",
ISSN = "1089-7089 (print), 1538-7305 (electronic)",
ISSN-L = "1089-7089",
bibdate = "Fri Nov 26 17:31:40 MST 2010",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bstj2000.bib",
acknowledgement = ack-nhfb,
fjournal = "Bell Labs Technical Journal",
journal-URL = "http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1538-7305/issues/",
onlinedate = "6 Nov 2007",
}
Related entries
- application,
5(1)130,
5(3)59,
5(4)171,
6(2)1,
6(2)30,
6(2)47,
7(1)25,
7(1)47,
7(1)197,
7(3)151,
8(1)27,
8(1)131,
8(1)233,
8(4)29,
9(1)165,
9(3)57,
9(4)25,
10(3)29,
10(3)61,
10(3)87,
10(3)199,
10(4)39,
10(4)101,
11(1)21,
11(3)191,
11(4)237,
12(1)5,
13(1)69,
13(2)1,
13(2)19,
13(2)31,
13(2)49,
13(2)57,
13(2)75,
13(2)209,
13(2)223,
13(4)161,
14(1)173
- Bell,
5(1)3,
5(1)35,
5(1)95,
5(1)215,
5(2)189,
5(3)217,
5(4)185,
6(1)229,
6(2)170,
7(1)227,
7(2)195,
8(2)129,
9(2)z,
12(3)39
- domain,
7(1)115,
8(3)97,
10(4)233,
13(1)247
- framework,
5(4)31,
6(1)152,
6(1)163,
8(1)157,
8(3)15,
8(4)7,
8(4)133,
9(3)45,
9(3)87,
10(4)53,
11(3)39,
11(3)73,
12(1)123,
12(3)39,
13(2)155,
14(3)127
- Gurbani, Vijay K.,
6(2)136,
7(1)3,
7(1)41,
8(1)83,
9(1)83,
9(3)57,
9(3)87,
9(3)255
- Internet,
6(1)98,
6(2)1,
6(2)6,
6(2)47,
6(2)74,
14(2)5
- Labs,
5(1)3,
5(1)35,
5(1)95,
5(1)215,
5(2)189,
5(3)217,
5(4)185,
6(1)229,
6(2)170,
7(1)227,
7(2)195,
8(2)129,
9(2)z,
12(3)39
- McGee, Andrew R.,
6(2)116,
8(1)113,
8(4)7,
8(4)187,
11(1)37,
11(1)79,
11(3)211,
12(3)39
- security,
6(2)74,
7(2)19,
8(1)113,
8(1)131,
8(4)7,
8(4)39,
8(4)93,
8(4)133,
8(4)187,
8(4)203,
9(2)5,
11(1)37,
11(1)59,
11(3)73,
11(3)191,
11(3)211,
11(4)291,
12(3)1,
12(3)39,
12(3)65,
12(3)79,
12(3)95,
12(3)101,
12(3)167,
12(3)187,
13(4)245,
14(1)259
- telephony,
5(2)157,
12(1)23,
14(1)267
- vulnerability,
8(4)173,
9(2)85,
9(2)189,
12(3)79