Publications

Export 31 results:
[ Author(Desc)] Title Type Year
Filters: Keyword is security of data  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
Arbaugh WA, Farber DJ, Smith JM.  1997.  A secure and reliable bootstrap architecture. , 1997 IEEE Symposium on Security and Privacy, 1997. Proceedings. :65-71.
Arbaugh WA, Davin JR, Farber DJ, Smith JM.  1998.  Security for virtual private intranets. Computer. 31(9):48-55.
B
Berthier R, Korman D, Cukier M, Hiltunen M, Vesonder G, Sheleheda D.  2008.  On the Comparison of Network Attack Datasets: An Empirical Analysis. :39-48.
Berthier R, Arjona J, Cukier M.  2009.  Analyzing the process of installing rogue software. :560-565.
Browne HK, Arbaugh WA, McHugh J, Fithen WL.  2001.  A trend analysis of exploitations. 2001 IEEE Symposium on Security and Privacy, 2001. S&P 2001. Proceedings. :214-229.
D
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Dumitras T, Efstathopoulos P..  2012.  The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
H
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
M
Mardziel P, Magill S, Hicks MW, Srivatsa M.  2011.  Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
Molina J, Gordon J, Chorin X, Cukier M.  2007.  An empirical study of filesystem activity following a SSH compromise. :1-5.
P
Petroni NL, Arbaugh WA.  2003.  The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
Pillai JK, Patel VM, Chellappa R, Ratha NK.  2010.  Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
R
Ramasamy HV, Pandey P, Lyons J, Cukier M, Sanders WH.  2002.  Quantifying the cost of providing intrusion tolerance in group communication systems. :229-238.
Ramsbrock D, Berthier R, Cukier M.  2007.  Profiling Attacker Behavior Following SSH Compromises. :119-124.
Ray A, Cleaveland R.  2006.  A Software Architectural Approach to Security by Design. Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International. 2:83-86.
Rosenfeld SN, Rus I, Cukier M.  2006.  Modeling the Symptomatic Fixes Archetype in Enterprise Computer Security. 1:178-188.
S
Salles-Loustau G, Berthier R, Collange E, Sobesto B, Cukier M.  2011.  Characterizing Attackers and Attacks: An Empirical Study. :174-183.
Sharma A, Martin JR, Anand N, Cukier M, Sanders WH.  2004.  Ferret: a host vulnerability checking tool. :389-394.

Pages