Search the dblp DataBase
Matt Bishop :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael Clifford , Daniel Faigin , Matt Bishop , Tasneem Brutch Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:428-429 [Conf ] Michael Clifford , C. Lavine , Matt Bishop The Solar Trust Model: Authentication Without Limitation. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:300-307 [Conf ] Matt Bishop , Anup K. Ghosh , James A. Whittaker How Useful is Software Fault Injection for Evaluating the Security of COTS Products? [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:339-342 [Conf ] Jingmin Zhou , Adam J. Carlson , Matt Bishop Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:117-126 [Conf ] Tuomas Aura , Matt Bishop , Dean Sniegowski Analyzing Single-Server Network Inhibition. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:108-117 [Conf ] Matt Bishop Theft of Information in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1988, pp:194-218 [Conf ] Ebrima N. Ceesay , Jingmin Zhou , Michael Gertz , Karl N. Levitt , Matt Bishop Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. [Citation Graph (0, 0)][DBLP ] DIMVA, 2006, pp:1-16 [Conf ] Matt Bishop Analyzing the Security of an Existing Computer System. [Citation Graph (0, 0)][DBLP ] FJCC, 1986, pp:1115-1119 [Conf ] Matt Bishop Panel: Teaching Undergraduate Information Assurance. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:169-171 [Conf ] Eric Haugh , Matt Bishop Testing C Programs for Buffer Overflow Vulnerabilities. [Citation Graph (0, 0)][DBLP ] NDSS, 2003, pp:- [Conf ] Matt Bishop Vulnerability Analysis: An Extended Abstract. [Citation Graph (0, 0)][DBLP ] Recent Advances in Intrusion Detection, 1999, pp:- [Conf ] Matt Bishop Teaching Computer Security. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:65-74 [Conf ] Matt Bishop Hierarchical Take-Grant Protection Systems. [Citation Graph (0, 0)][DBLP ] SOSP, 1981, pp:109-122 [Conf ] Matt Bishop , Lawrence Snyder The Transfer of Information and Authority in a Protection System. [Citation Graph (0, 0)][DBLP ] SOSP, 1979, pp:45-54 [Conf ] John R. Hughes , Tuomas Aura , Matt Bishop Using Conservation of Flow as a Security Mechanism in Network Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:132-131 [Conf ] Matt Bishop An Authentication Mechanism for USENET. [Citation Graph (0, 0)][DBLP ] USENIX Winter, 1991, pp:281-288 [Conf ] David S. Peterson , Matt Bishop , Raju Pandey A Flexible Containment Mechanism for Executing Untrusted Code. [Citation Graph (0, 0)][DBLP ] USENIX Security Symposium, 2002, pp:207-225 [Conf ] Matt Bishop , Bhume Bhumiratana , Rick Crawford , Karl N. Levitt How to Sanitize Data. [Citation Graph (0, 0)][DBLP ] WETICE, 2004, pp:217-222 [Conf ] David P. Gilliam , John C. Kelly , John D. Powell , Matt Bishop Development of a Software Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:144-149 [Conf ] David P. Gilliam , John D. Powell , Matt Bishop Application of Lightweight Formal Methods to Software Security. [Citation Graph (0, 0)][DBLP ] WETICE, 2005, pp:160-165 [Conf ] David P. Gilliam , Thomas L. Wolfe , Joseph S. Sherif , Matt Bishop Software Security Checklist for the Software Life Cycle. [Citation Graph (0, 0)][DBLP ] WETICE, 2003, pp:243-248 [Conf ] David P. Gilliam , John C. Kelly , Matt Bishop Reducing Software Security Risk through an Integrated Approach. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:141-146 [Conf ] David P. Gilliam , John D. Powell , Matt Bishop , Chris Andrew , Sameer Jog Security Verification Techniques Applied to PatchLink COTS Software. [Citation Graph (0, 0)][DBLP ] WETICE, 2006, pp:319-325 [Conf ] Matt Bishop , Rick Crawford , Bhume Bhumiratana , Lisa Clark , Karl N. Levitt Some Problems in Sanitizing Network Data. [Citation Graph (0, 0)][DBLP ] WETICE, 2006, pp:307-312 [Conf ] David P. Gilliam , Matt Bishop Eleventh Securities Technologies (ST) Workshop Report. [Citation Graph (0, 0)][DBLP ] WETICE, 2006, pp:305-306 [Conf ] David P. Gilliam , John Powell , Eric Haugh , Matt Bishop Addressing Software Security and Mitigations in the Life Cycle. [Citation Graph (0, 0)][DBLP ] SEW, 2003, pp:201- [Conf ] Ruzena Bajcsy , Terry Benzel , Matt Bishop , Robert Braden , Carla E. Brodley , Sonia Fahmy , Sally Floyd , W. Hardaker , Anthony D. Joseph , George Kesidis , Karl N. Levitt , Robert Lindell , Peng Liu , David Miller , Russ Mundy , Cliford Neuman , Ron Ostrenga , Vern Paxson , Phillip A. Porras , Catherine Rosenberg , J. Doug Tygar , Shankar Sastry , Daniel F. Sterne , Shyhtsun Felix Wu Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal ] Earl Barr , Matt Bishop , Mark Gondree Fixing federal e-voting standards. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:3, pp:19-24 [Journal ] Brant Hashii , Scott Malabarba , Raju Pandey , Matt Bishop Supporting reconfigurable security policies for mobile programs. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2000, v:33, n:1-6, pp:77-93 [Journal ] Matt Bishop Trends in academic research: vulnerabilities analysis and intrusion detection. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2002, v:21, n:7, pp:609-612 [Journal ] Matt Bishop , Daniel V. Klein Improving system security via proactive password checking. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1995, v:14, n:3, pp:233-249 [Journal ] Matt Bishop An Application of a Fast Data Encryption Standard Implementation. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1988, v:1, n:3, pp:221-254 [Journal ] Matt Bishop , Michael Dilger Checking for Race Conditions in File Accesses. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1996, v:2, n:2, pp:131-152 [Journal ] Matt Bishop What Is Computer Security? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:1, pp:67-69 [Journal ] Matt Bishop , Deborah A. Frincke Teaching Robust Programming. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:2, pp:54-57 [Journal ] Matt Bishop , Deborah A. Frincke A Human Endeavor: Lessons from Shakespeare and Beyond. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:4, pp:49-51 [Journal ] Matt Bishop , Deborah A. Frincke Teaching Secure Programming. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:5, pp:54-56 [Journal ] Matt Bishop , Deborah A. Frincke Who Owns Your Computer? [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2006, v:4, n:2, pp:61-63 [Journal ] Deborah A. Frincke , Matt Bishop Guarding the Castle Keep: Teaching with the Fortress Metaphor. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:3, pp:69-72 [Journal ] Deborah A. Frincke , Matt Bishop Back to School. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:4, pp:54-56 [Journal ] Deborah A. Frincke , Matt Bishop Joining the Security Education Community. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:5, pp:61-63 [Journal ] Deborah A. Frincke , Matt Bishop Academic Degrees and Professional Certification. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:6, pp:56-58 [Journal ] Matt Bishop Theft of Information in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:4, pp:283-308 [Journal ] Matt Bishop Conspiracy and Information Flow in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:4, pp:331-360 [Journal ] Edward Amoroso , Matt Bishop Secruity Enables Electronic Commerce. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 1996, v:4, n:3, pp:- [Journal ] Matt Bishop Profiling Under UNIX by Patching. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1987, v:17, n:10, pp:729-739 [Journal ] Matt Bishop Collaboration using Roles. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1990, v:20, n:5, pp:485-497 [Journal ] Tom Walcott , Matt Bishop Traducement: A model for record security. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:576-590 [Journal ] Jingmin Zhou , Mark Heckman , Brennen Reynolds , Adam Carlson , Matt Bishop Modeling network intrusion detection alerts for correlation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:1, pp:- [Journal ] Sean Peisert , Matt Bishop How to Design Computer Security Experiments. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2007, pp:141-148 [Conf ] Matt Bishop E-Voting as a Teaching Tool. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2007, pp:17-24 [Conf ] Vicentiu Neagoe , Matt Bishop Inconsistency in deception for defense. [Citation Graph (0, 0)][DBLP ] NSPW, 2006, pp:31-38 [Conf ] Rick Crawford , Matt Bishop , Bhume Bhumiratana , Lisa Clark , Karl N. Levitt Sanitization models and their limitations. [Citation Graph (0, 0)][DBLP ] NSPW, 2006, pp:41-56 [Conf ] Shiau-Huey Wang , Chinyang Henry Tseng , Karl N. Levitt , Matthew Bishop Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:127-145 [Conf ] Matt Bishop , David Wagner Risks of e-voting. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:11, pp:120- [Journal ] Matt Bishop Teaching context in information security. [Citation Graph (0, 0)][DBLP ] ACM Journal of Educational Resources in Computing, 2006, v:6, n:3, pp:- [Journal ] Sean Peisert , Matt Bishop , Sidney Karin , Keith Marzullo Analysis of Computer Intrusions Using Sequences of Function Calls. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:2, pp:137-150 [Journal ] Investigating the Implications of Virtual Machine Introspection for Digital Forensics. [Citation Graph (, )][DBLP ] Reflections on UNIX Vulnerabilities. [Citation Graph (, )][DBLP ] Of Paper Trails and Voter Receipts. [Citation Graph (, )][DBLP ] Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. [Citation Graph (, )][DBLP ] Digital Forensics: Defining a Research Agenda. [Citation Graph (, )][DBLP ] Case Studies of an Insider Framework. [Citation Graph (, )][DBLP ] Toward Models for Forensic Analysis. [Citation Graph (, )][DBLP ] Computer Forensics in Forensis. [Citation Graph (, )][DBLP ] Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. [Citation Graph (, )][DBLP ] ST Workshop Final Report. [Citation Graph (, )][DBLP ] Twelfth Securities Technologies (ST) Workshop Report. [Citation Graph (, )][DBLP ] Privacy aware data sharing: balancing the usability and privacy of datasets. [Citation Graph (, )][DBLP ] Strong mobile device protection from loss and capture. [Citation Graph (, )][DBLP ] The security and privacy implications of using social networks to deliver healthcare. [Citation Graph (, )][DBLP ] Search in 0.065secs, Finished in 0.067secs