- [1]
- G. Allon, T. Raviv, and
  R. Y. Rubinstein.
Application of the cross entropy method for buffer allocation problem in
  simulation based environment.
In Fourth Workshop on Rare Event Simulation and Related Combinatorial
  Optimization Problems, RESIM/COP'02, April 2002.
- [2]
- Subramanian Arumugam,
  Abdelsalam (Sumi) Helal, and Amar Nalla.
aZIMAS: Web mobile agent system.
In N. Suri, editor, Mobile Agents : 6th International
  Conference MA 2002, pages 1–15. Springer-Verlag, October 2002.
Lecture Notes in Computer Science; Vol 2535.
- [3]
- M. Belsi.
Developing an enterprise IT security data model.
Master's thesis, Coventry University, January 2002.
- [4]
- M.A.
  Belsis, A.N. Godwin, and L. Smalov.
An enterprise IT security data model.
In 4th International Conference on Enterprise Information Systems, ICEIS
  2002, volume 2, pages 885–891. ICEIS Press, 2002.
- [5]
- T. Bohne.
A general intruder for security protocols in MANDE.
Master's thesis, University of Wyoming, 2002.
- [6]
- Gérard Chauvel, Maija
  Kuusela, Dominique D'Inverno, and Serge
  Lasserre.
Task
  based adaptive profiling and debugging.
European Patent 1182556, 2002.
- [7]
- Kefeng Chen.
Methods
  and systems for authenticating business partners for secured electronic
  transactions.
World Intellectual Property Organization Patent 0206932, 2002.
- [8]
- A. Dolgui, A. Eremeev,
  A. Kolokolov, and V. Sigaev.
A genetic algorithm for buffer allocation in production line with unreliable
  machines.
Journal of Mathematical Modelling and Algorithms, 1(2):89–104,
  2002.
(doi:10.1023/A:1016560109076)
- [9]
- Liu
  Dongxi, Li Xiaoyong, and Bai Yingcai.
An attack-finding algorithm for security protocols.
Journal of Computer Science and Technology, 17(4):450–463,
  2002.
- [10]
- Myrna C. M dos Santos,
  José A. M. Xexéo, and José F.
  de Rezende.
Anáalise
  formal de protocolos de segurança para redes celulares.
Technical Report GTA-02-26, Universidade Federal do Rio de Janeiro/UFRJ,
  2002.
- [11]
- A. J.
  D'Souza.
Formal analysis on cryptographic protocols.
Master's thesis, Indian Institute of Technology, Bombay, India, May 2002.
- [12]
- Michael Goedicke and Uwe
  Zdun.
Piecemeal
  legacy migrating with an architectural pattern language: A case study.
In Journal of Software Maintenance and Evolution: Research and
  Practice, 14(1):1–30, 2002.
(doi:10.1002/smr.243)
- [13]
- M. Grechanik, D. Perry, and
  D. Batory.
An approach to evolving database dependent systems.
In International Workshop on Principles of Software Evolution
  (IWPSE), pages 113–116, 2002.
- [14]
- Mark
  Grechanik, Dewayne Perry, and Don Batory.
An
  approach to change management of evolving database schemas.
In Seventh International Conference on Software Reuse ICSR 2002—Young
  Researchers Workshop, 2002.
- [15]
- Mark Grechanik, Dewayne
  Perry, and Don Batory.
An approach to evolving database dependent systems.
In International Conference on Software Engineering: Proceedings of the
  International Workshop on Principles of Software Evolution, pages
  113–116. ACM Press, 2002.
(doi:10.1145/512035.512061)
- [16]
- K. Haneda, T. Kajima,
  T. Koyama, H. Muranaka, H. Dojo,
  and Y. Aratani.
Development of quantitative security optimization approach for the picture
  archives and carrying system between a clinic and a rehabilitation center.
Proceedings of SPIE — The International Society for Optical
  Engineering, 4685:422–429, 2002.
(doi:10.1117/12.467036)
- [17]
- Elliott
  Hughes.
How many trivial getter methods does Java have.
SIGPLAN Notices, 37(8):19–24, August 2002.
- [18]
- Jan
  Jürjens.
Secure Java development with UML.
In Proceedings of the First INetSec '01 International IFIP TC-11 WG 11.4
  Working Conference on Network Security. IFIP, Kluwer, November
  2002.
- [19]
- J. Jürjens.
Modelling audit security for smart-card payment schemes with uml-sec.
IFIP TC11 16th International Conference on Information Security, lFIP/Sec
  2001, 65:93–107, 2002.
- [20]
- Kazuhiko
  Kato and Yoshihiro Oyama.
Softwarepot:
  An encapsulated transferable file system for secure software circulation.
In Software Security — Theories and Systems: Proceedings of the
  International Symposium on Software Security, pages 112–132.
  Springer-Verlag, November 2002.
Lecture Notes in Computer Science; Vol 2609.
- [21]
- Holger M. Kienle, Anke Weber,
  Jens Jahnke, and Hausi A. Müller.
Tackling
  the adoption problem of domain-specific visual languages.
In 2nd OOPSLA Workshop on Domain Specific Visual Languages,
  November 2002.
- [22]
- Victor Kouznetsov, Charles L.
  Vigue, Martin Fallenstedt, and Daniel
  Melchione.
System
  and method to verify trusted status of peer in a peer-to-peer network
  environment.
European Patent 1259045, 2002.
- [23]
- Sumit
  Kumar, Rajesh Rajamani, and Abhishek Saxena.
Comminst:
  Instrumenting process communication, 2002.
Available online http://www.cs.wisc.edu/ raj/comminst/comminstpaper.doc.
- [24]
- Philipp W.
  Kutter.
Montages — Engineering in Computer Languages.
PhD thesis, Swiss Federal Institute of Technology, Zurich, CH, 2002.
- [25]
- Philipp W.
  Kutter.
Replacing
  generation of interpreters with a combination of partial evaluation and
  parameterized signatures, leading to a concept for meta-bootstrapping.
In ECOOP'2002 Workshop on Generative Programming, 2002.
- [26]
- G. Liu,
  Y. He, Y. Qiu, and J. Yu.
Research on influence of solving quality based on different initializing
  solution algorithm in tabu search.
In 1st International Conference on Communications, Circuits and Systems,
  ICCCAS 2002, volume 2, pages 1141–1145. Institute of Electrical and
  Electronics Engineers Inc., 2002.
(doi:10.1109/ICCCAS.2002.1178986)
- [27]
- C. Löbbecke and
  M. Falkenberg.
A framework for assessing market entry opportunities for internet-based TV.
International Journal on Media Management, 4(2), 2002.
- [28]
- S. Lukell and H. Hutchison.
Attack construction analysis of cryptographic protocols within a
  multidimentional security protocol engineering framework.
Technical report, Cape Town University, 2002.
- [29]
- David
  Mussington.
Concepts
  for enhancing critical infrastructure protection : relating Y2K to CIP
  research and development.
RAND, Santa Monica, CA, USA, 2002.
- [30]
- E. W. T.
  Ngai and F. K. T. Wat.
A literature review and classification of e-commerce research.
Information and Management, 39(5):415–429, March 2002.
- [31]
- Frédéric Oehl and
  David Sinclair.
Combining
  ISABELLE and Timbuk for cryptographic protocol verification.
In Securité de la Communication sur Intenet: SECI 02, pages
  57–67, Tunis, Tunisia, September 2002. INRIA, Le Centre de Calcul El
  Khawarizmi.
- [32]
- F. Oehl,
  G. Cece, O. Kouchnarenko, and
  D. Sinclair.
Automatic approximation
  for the verification of cryptographic protocols.
In P. Ryan, editor, Proceedings of the Conference on
  Formal Aspects of Security. Springer-Verlag, 2002.
Lecture Notes in Computer Science; Vol 2629.
- [33]
- Yoshihiro
  Oyama, Katsunori Kanda, and Kazuhiko Kato.
Design and
  implementation of secure software execution system SoftwarePot.
Computer Software, 19(6):2–12, November 2002.
In Japanese.
- [34]
- J. Pang.
Analysis of a security protocol in μcrl.
CWI Technical Report SEN-R0201, Centrum voor Wiskunde en Informatica,
  Amsterdam, The Netherlands, January 2002.
- [35]
- M. Panti, L. Spalazzi, and
  S. Tacconi.
Attacks
  on cryptographic protocols: A survey.
Technical Report TR-2002-10, University of Ancona, 2002.
- [36]
- Dietrich Paulus and Joachim
  Hornegger.
Applied Pattern Recognition: A Practical Introduction to Image and Speech
  Processing in C++.
Vieweg, fourth edition, 2002.
- [37]
- Radia J.
  Perlman.
Efficient
  revocation of registration authorities.
World Intellectual Property Organization Patent 02060148, 2002.
- [38]
- Konstantinos
  Raptis.
Software
  Component Communication Methodologies.
PhD thesis, University of the Aegean, Department of Information and
  Communication Systems, Samos, Greece, 2002.
In Greek.
- [39]
- Erik
  Riedel, Mahesh Kallahalla, and Ram
  Swaminathan.
A
  framework for evaluating storage system security.
In Proceedings of the FAST 2002 Conference on FILE and Storage
  Technologies. USENIX, USENIX Association, January 2002.
- [40]
- E. Saul and A. Hutchison.
Using GYPSIE, GYNGER and visual GNY to analyze cryptographic protocols in
  SPEAR II.
IFIP TC11 WG11.1/WG11.2 8th Annual Working Conference on Information
  Security Management and Small Systems Security, 72:73–85, 2002.
- [41]
- A. Schreiner.
Unix tools as visual programming components in a GUI-builder environment.
ACM Computing Reviews, November 2002.
- [42]
- Glenn
  Vanderburg.
Using the source: Software archaeology for users of open source software.
Online
  http://www.delphis.com/downloads/presentations/java/UsingTheSource_handouts.pdf
  (current May 2003), July 2002.
Tutorial presented at the O'Reilly Open Source Convention.
- [43]
- Stefan Voß and David L.
  Woodruff, editors.
Optimization Software Class Libraries.
Kluwer Academic Publishers, 2002.
- [44]
- Vytautas Štuikys and
  Robertas Damaševičius.
Relationship model of abstractions used for developing domain generators.
Informatica, 13(1):111–128, 2002.
- [45]
- G. Wimmel and J. Jürgens.
Specification-based test generation for security-critical systems using
  mutuations.
In Proceedings of the 4th ICFEM2002 International Conference on Formal
  Engineering Methods. Springer-Verlag, 2002.
- [46]
- Dong xi Liu and Ying cai Bai.
A study on the proof method of authentication protocols based on Strand
  space.
Journal of Software, 13(4), 2002.
- [47]
- F. Xia,
  Q. Luo, and M. Yin.
Software implementation of PACS viewer: The use of COM technology.
Proceedings of SPIE — The International Society for Optical
  Engineering, 4536:101–107, 2002.
(doi:10.1117/12.462532)
- [48]
- Uwe Zdun.
Language
  Support for Dynamic and Evolving Software Architectures.
PhD thesis, University of Essen, Essen, Germany, January 2002.
- [49]
- X. Zhang, D. Li,
  X. Zhu, and N. Chen.
Systematic plan of building web geographic information system based on activex
  control.
Proceedings of SPIE — The International Society for Optical
  Engineering, 4886:307–314, 2002.
(doi:10.1117/12.462322)