Publications
Export 31 results:
[ Author] Title Type Year Filters: Keyword is security of data [Clear All Filters]
1998. A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
1998. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
1997. A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
2001. A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
2008. On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
2009. Prioritizing Vulnerability Remediation by Determining Attacker-Targeted Vulnerabilities. Security Privacy, IEEE. 7(1):42-48.
2011. Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
2012. The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
2003. A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
2011. Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
2010. Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
2002. Quantifying the cost of providing intrusion tolerance in group communication systems. :229-238.
2006. A Software Architectural Approach to Security by Design. Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International. 2:83-86.