Volgen
Matt Bishop
Titel
Geciteerd door
Geciteerd door
Jaar
What is computer security?
M Bishop
IEEE Security & Privacy 99 (1), 67-69, 2003
29902003
What is computer security?
M Bishop
IEEE Security & Privacy 99 (1), 67-69, 2003
29902003
Introduction to computer security
M Bishop
Addison-Wesley, 2005
8392005
Checking for race conditions in file accesses
M Bishop, M Dilger
Computing systems 2 (2), 131-152, 1996
4321996
Improving system security via proactive password checking
M Bishop, DV Klein
Computers & Security 14 (3), 233-249, 1995
2201995
A critical analysis of vulnerability taxonomies
M Bishop, D Bailey
Technical Report CSE-96-11, Department of Computer Science at the University …, 1996
1971996
Storm clouds rising: security challenges for IaaS cloud computing
B Hay, K Nance, M Bishop
2011 44th Hawaii International Conference on System Sciences, 1-7, 2011
1952011
A taxonomy of unix system and network vulnerabilities
M Bishop
Technical Report CSE-95-10, Department of Computer Science, University of …, 1995
1941995
Virtual machine introspection: Observation or interference?
K Nance, M Bishop, B Hay
IEEE Security & Privacy 6 (5), 32-37, 2008
1932008
Vulnerabilities analysis
M Bishop
Proceedings of the Recent Advances in intrusion Detection, 125-136, 1999
1921999
Testing C programs for buffer overflow vulnerabilities
ED Haugh, M Bishop
University of California, Davis, 2002
1852002
Defining the insider threat
M Bishop, C Gates
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
1792008
Property-based testing: a new approach to testing for assurance
G Fink, M Bishop
ACM SIGSOFT Software Engineering Notes 22 (4), 74-80, 1997
1741997
About penetration testing
M Bishop
IEEE Security & Privacy 5 (6), 84-87, 2007
1632007
Modeling network intrusion detection alerts for correlation
J Zhou, M Heckman, B Reynolds, A Carlson, M Bishop
ACM Transactions on Information and System Security (TISSEC) 10 (1), 4-es, 2007
1632007
A Flexible Containment Mechanism for Executing Untrusted Code.
DS Peterson, M Bishop, R Pandey
Usenix Security Symposium, 207-225, 2002
1512002
The art and science of computer security
MA Bishop
Addison-Wesley Professional, 2002
1402002
Is anybody home? inferring activity from smart home network traffic
B Copos, K Levitt, M Bishop, J Rowe
2016 IEEE Security and Privacy Workshops (SPW), 245-251, 2016
1392016
Attack class: Address spoofing
LT Heberlein, M Bishop
Proceedings of the 19th National Information Systems Security Conference …, 1996
1271996
The transfer of information and authority in a protection system
M Bishop, L Snyder
Proceedings of the seventh ACM symposium on Operating systems principles, 45-54, 1979
1191979
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20