The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matt Bishop: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem Brutch
    Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:428-429 [Conf]
  2. Michael Clifford, C. Lavine, Matt Bishop
    The Solar Trust Model: Authentication Without Limitation. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:300-307 [Conf]
  3. Matt Bishop, Anup K. Ghosh, James A. Whittaker
    How Useful is Software Fault Injection for Evaluating the Security of COTS Products? [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:339-342 [Conf]
  4. Jingmin Zhou, Adam J. Carlson, Matt Bishop
    Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:117-126 [Conf]
  5. Tuomas Aura, Matt Bishop, Dean Sniegowski
    Analyzing Single-Server Network Inhibition. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:108-117 [Conf]
  6. Matt Bishop
    Theft of Information in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:194-218 [Conf]
  7. Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop
    Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:1-16 [Conf]
  8. Matt Bishop
    Analyzing the Security of an Existing Computer System. [Citation Graph (0, 0)][DBLP]
    FJCC, 1986, pp:1115-1119 [Conf]
  9. Matt Bishop
    Panel: Teaching Undergraduate Information Assurance. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:169-171 [Conf]
  10. Eric Haugh, Matt Bishop
    Testing C Programs for Buffer Overflow Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2003, pp:- [Conf]
  11. Matt Bishop
    Vulnerability Analysis: An Extended Abstract. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  12. Matt Bishop
    Teaching Computer Security. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:65-74 [Conf]
  13. Matt Bishop
    Hierarchical Take-Grant Protection Systems. [Citation Graph (0, 0)][DBLP]
    SOSP, 1981, pp:109-122 [Conf]
  14. Matt Bishop, Lawrence Snyder
    The Transfer of Information and Authority in a Protection System. [Citation Graph (0, 0)][DBLP]
    SOSP, 1979, pp:45-54 [Conf]
  15. John R. Hughes, Tuomas Aura, Matt Bishop
    Using Conservation of Flow as a Security Mechanism in Network Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:132-131 [Conf]
  16. Matt Bishop
    An Authentication Mechanism for USENET. [Citation Graph (0, 0)][DBLP]
    USENIX Winter, 1991, pp:281-288 [Conf]
  17. David S. Peterson, Matt Bishop, Raju Pandey
    A Flexible Containment Mechanism for Executing Untrusted Code. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:207-225 [Conf]
  18. Matt Bishop, Bhume Bhumiratana, Rick Crawford, Karl N. Levitt
    How to Sanitize Data. [Citation Graph (0, 0)][DBLP]
    WETICE, 2004, pp:217-222 [Conf]
  19. David P. Gilliam, John C. Kelly, John D. Powell, Matt Bishop
    Development of a Software Security Assessment Instrument to Reduce Software Security Risk. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:144-149 [Conf]
  20. David P. Gilliam, John D. Powell, Matt Bishop
    Application of Lightweight Formal Methods to Software Security. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:160-165 [Conf]
  21. David P. Gilliam, Thomas L. Wolfe, Joseph S. Sherif, Matt Bishop
    Software Security Checklist for the Software Life Cycle. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:243-248 [Conf]
  22. David P. Gilliam, John C. Kelly, Matt Bishop
    Reducing Software Security Risk through an Integrated Approach. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:141-146 [Conf]
  23. David P. Gilliam, John D. Powell, Matt Bishop, Chris Andrew, Sameer Jog
    Security Verification Techniques Applied to PatchLink COTS Software. [Citation Graph (0, 0)][DBLP]
    WETICE, 2006, pp:319-325 [Conf]
  24. Matt Bishop, Rick Crawford, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt
    Some Problems in Sanitizing Network Data. [Citation Graph (0, 0)][DBLP]
    WETICE, 2006, pp:307-312 [Conf]
  25. David P. Gilliam, Matt Bishop
    Eleventh Securities Technologies (ST) Workshop Report. [Citation Graph (0, 0)][DBLP]
    WETICE, 2006, pp:305-306 [Conf]
  26. David P. Gilliam, John Powell, Eric Haugh, Matt Bishop
    Addressing Software Security and Mitigations in the Life Cycle. [Citation Graph (0, 0)][DBLP]
    SEW, 2003, pp:201- [Conf]
  27. Ruzena Bajcsy, Terry Benzel, Matt Bishop, Robert Braden, Carla E. Brodley, Sonia Fahmy, Sally Floyd, W. Hardaker, Anthony D. Joseph, George Kesidis, Karl N. Levitt, Robert Lindell, Peng Liu, David Miller, Russ Mundy, Cliford Neuman, Ron Ostrenga, Vern Paxson, Phillip A. Porras, Catherine Rosenberg, J. Doug Tygar, Shankar Sastry, Daniel F. Sterne, Shyhtsun Felix Wu
    Cyber defense technology networking and evaluation. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2004, v:47, n:3, pp:58-61 [Journal]
  28. Earl Barr, Matt Bishop, Mark Gondree
    Fixing federal e-voting standards. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:3, pp:19-24 [Journal]
  29. Brant Hashii, Scott Malabarba, Raju Pandey, Matt Bishop
    Supporting reconfigurable security policies for mobile programs. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2000, v:33, n:1-6, pp:77-93 [Journal]
  30. Matt Bishop
    Trends in academic research: vulnerabilities analysis and intrusion detection. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:609-612 [Journal]
  31. Matt Bishop, Daniel V. Klein
    Improving system security via proactive password checking. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1995, v:14, n:3, pp:233-249 [Journal]
  32. Matt Bishop
    An Application of a Fast Data Encryption Standard Implementation. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1988, v:1, n:3, pp:221-254 [Journal]
  33. Matt Bishop, Michael Dilger
    Checking for Race Conditions in File Accesses. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1996, v:2, n:2, pp:131-152 [Journal]
  34. Matt Bishop
    What Is Computer Security? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:1, pp:67-69 [Journal]
  35. Matt Bishop, Deborah A. Frincke
    Teaching Robust Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:2, pp:54-57 [Journal]
  36. Matt Bishop, Deborah A. Frincke
    A Human Endeavor: Lessons from Shakespeare and Beyond. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:4, pp:49-51 [Journal]
  37. Matt Bishop, Deborah A. Frincke
    Teaching Secure Programming. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:5, pp:54-56 [Journal]
  38. Matt Bishop, Deborah A. Frincke
    Who Owns Your Computer? [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2006, v:4, n:2, pp:61-63 [Journal]
  39. Deborah A. Frincke, Matt Bishop
    Guarding the Castle Keep: Teaching with the Fortress Metaphor. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:3, pp:69-72 [Journal]
  40. Deborah A. Frincke, Matt Bishop
    Back to School. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:4, pp:54-56 [Journal]
  41. Deborah A. Frincke, Matt Bishop
    Joining the Security Education Community. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:5, pp:61-63 [Journal]
  42. Deborah A. Frincke, Matt Bishop
    Academic Degrees and Professional Certification. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2004, v:2, n:6, pp:56-58 [Journal]
  43. Matt Bishop
    Theft of Information in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:4, pp:283-308 [Journal]
  44. Matt Bishop
    Conspiracy and Information Flow in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:4, pp:331-360 [Journal]
  45. Edward Amoroso, Matt Bishop
    Secruity Enables Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 1996, v:4, n:3, pp:- [Journal]
  46. Matt Bishop
    Profiling Under UNIX by Patching. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1987, v:17, n:10, pp:729-739 [Journal]
  47. Matt Bishop
    Collaboration using Roles. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1990, v:20, n:5, pp:485-497 [Journal]
  48. Tom Walcott, Matt Bishop
    Traducement: A model for record security. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:4, pp:576-590 [Journal]
  49. Jingmin Zhou, Mark Heckman, Brennen Reynolds, Adam Carlson, Matt Bishop
    Modeling network intrusion detection alerts for correlation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:1, pp:- [Journal]
  50. Sean Peisert, Matt Bishop
    How to Design Computer Security Experiments. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:141-148 [Conf]
  51. Matt Bishop
    E-Voting as a Teaching Tool. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:17-24 [Conf]
  52. Vicentiu Neagoe, Matt Bishop
    Inconsistency in deception for defense. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:31-38 [Conf]
  53. Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt
    Sanitization models and their limitations. [Citation Graph (0, 0)][DBLP]
    NSPW, 2006, pp:41-56 [Conf]
  54. Shiau-Huey Wang, Chinyang Henry Tseng, Karl N. Levitt, Matthew Bishop
    Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:127-145 [Conf]
  55. Matt Bishop, David Wagner
    Risks of e-voting. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:11, pp:120- [Journal]
  56. Matt Bishop
    Teaching context in information security. [Citation Graph (0, 0)][DBLP]
    ACM Journal of Educational Resources in Computing, 2006, v:6, n:3, pp:- [Journal]
  57. Sean Peisert, Matt Bishop, Sidney Karin, Keith Marzullo
    Analysis of Computer Intrusions Using Sequences of Function Calls. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:2, pp:137-150 [Journal]

  58. Investigating the Implications of Virtual Machine Introspection for Digital Forensics. [Citation Graph (, )][DBLP]


  59. Reflections on UNIX Vulnerabilities. [Citation Graph (, )][DBLP]


  60. Of Paper Trails and Voter Receipts. [Citation Graph (, )][DBLP]


  61. Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. [Citation Graph (, )][DBLP]


  62. Digital Forensics: Defining a Research Agenda. [Citation Graph (, )][DBLP]


  63. Case Studies of an Insider Framework. [Citation Graph (, )][DBLP]


  64. Toward Models for Forensic Analysis. [Citation Graph (, )][DBLP]


  65. Computer Forensics in Forensis. [Citation Graph (, )][DBLP]


  66. Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy. [Citation Graph (, )][DBLP]


  67. ST Workshop Final Report. [Citation Graph (, )][DBLP]


  68. Twelfth Securities Technologies (ST) Workshop Report. [Citation Graph (, )][DBLP]


  69. Privacy aware data sharing: balancing the usability and privacy of datasets. [Citation Graph (, )][DBLP]


  70. Strong mobile device protection from loss and capture. [Citation Graph (, )][DBLP]


  71. The security and privacy implications of using social networks to deliver healthcare. [Citation Graph (, )][DBLP]


Search in 0.083secs, Finished in 0.085secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002