skip to main content
column

Risks to the public

Published: 11 May 2010 Publication History
First page of PDF

Cited By

View all
  • (2012)IntroductionImproving Software Testing10.1007/978-3-642-27464-0_1(1-9)Online publication date: 3-Feb-2012
  • (2010)Cyber security for emergency management2010 IEEE International Conference on Technologies for Homeland Security (HST)10.1109/THS.2010.5654965(476-480)Online publication date: Nov-2010

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 35, Issue 3
May 2010
151 pages
ISSN:0163-5948
DOI:10.1145/1764810
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 May 2010
Published in SIGSOFT Volume 35, Issue 3

Check for updates

Qualifiers

  • Column

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2012)IntroductionImproving Software Testing10.1007/978-3-642-27464-0_1(1-9)Online publication date: 3-Feb-2012
  • (2010)Cyber security for emergency management2010 IEEE International Conference on Technologies for Homeland Security (HST)10.1109/THS.2010.5654965(476-480)Online publication date: Nov-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media