The SCEAS System
Navigation Menu

Search the dblp DataBase


Stephen D. Wolthusen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stephen D. Wolthusen
    Security Policy Enforcement at the File System Level in the Windows NT Operating System Family. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2001, pp:55-63 [Conf]
  2. Stephen D. Wolthusen
    Goalkeeper: Close-In Interface Protection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:334-341 [Conf]
  3. E. Rademer, Stephen D. Wolthusen
    Transparent Access To Encrypted Data Using Operating System Network Stack Extensions. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  4. Frank Graf, Stephen D. Wolthusen
    A Capability-Based Transparent Cryptographic File System. [Citation Graph (0, 0)][DBLP]
    CW, 2005, pp:101-108 [Conf]
  5. Bernhard M. Hämmerli, Stephen D. B. Wolthusen
    Critical (Information) Infrastructure Protection. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung (1), 2005, pp:466-467 [Conf]
  6. Stephen D. Wolthusen
    A Distributed Multipurpose Mail Guard (Blinded). [Citation Graph (0, 0)][DBLP]
    IAW, 2003, pp:268-275 [Conf]
  7. Jaromir Likavec, Stephen D. Wolthusen
    Enforcing Messaging Security Policies. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:131-138 [Conf]
  8. Ole Martin Dahl, Stephen D. Wolthusen
    Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets. [Citation Graph (0, 0)][DBLP]
    IWIA, 2006, pp:157-168 [Conf]
  9. Stephen D. Wolthusen
    Access and Use Control using Externally Controlled Reference Monitors. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2002, v:36, n:1, pp:58-69 [Journal]
  10. Stephen D. Wolthusen
    The Role of Mathematics in Information Security Education. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2007, pp:129-136 [Conf]
  11. Nils Kalstad Svendsen, Stephen D. Wolthusen
    Graph Models of Critical Infrastructure Interdependencies. [Citation Graph (0, 0)][DBLP]
    AIMS, 2007, pp:208-211 [Conf]

  12. Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. [Citation Graph (, )][DBLP]

  13. Modeling Network Security Services in Tactical Networks. [Citation Graph (, )][DBLP]

  14. Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion. [Citation Graph (, )][DBLP]

  15. 08102 Outcome Working Group -- Situational Awareness. [Citation Graph (, )][DBLP]

  16. Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. [Citation Graph (, )][DBLP]

  17. Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance. [Citation Graph (, )][DBLP]

  18. A Security Analysis of Biometric Template Protection Schemes. [Citation Graph (, )][DBLP]

  19. Host-Based Security Sensor Integrity in Multiprocessing Environments. [Citation Graph (, )][DBLP]

  20. Trouble Brewing: Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems. [Citation Graph (, )][DBLP]

  21. A Framework for 3D Geospatial Buffering of Events of Interest in Critical Infrastructures. [Citation Graph (, )][DBLP]

  22. An Analysis of Cyclical Interdependencies in Critical Infrastructures. [Citation Graph (, )][DBLP]

  23. Network Forensics of Partial SSL/TLS Encrypted Traffic Classification Using Clustering Algorithms. [Citation Graph (, )][DBLP]

  24. Using Observations of Invariant Behaviour to Detect Malicious Agency in Distributed Environments. [Citation Graph (, )][DBLP]

  25. Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination. [Citation Graph (, )][DBLP]

  26. Overcast: Forensic Discovery in Cloud Environments. [Citation Graph (, )][DBLP]

  27. Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. [Citation Graph (, )][DBLP]

  28. Multigraph Dependency Models for Heterogeneous Infrastructures. [Citation Graph (, )][DBLP]

  29. Digital Watermarking: From Concepts to Real-Time Video Applications. [Citation Graph (, )][DBLP]

  30. Editorial. [Citation Graph (, )][DBLP]

  31. From the Editor-in-Chief. [Citation Graph (, )][DBLP]

  32. Editorial. [Citation Graph (, )][DBLP]

  33. Editorial. [Citation Graph (, )][DBLP]

  34. Editorial. [Citation Graph (, )][DBLP]

Search in 0.038secs, Finished in 0.040secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002