Matt Bishop
Cím
Hivatkozott rá
Hivatkozott rá
Év
What is computer security?
M Bishop
IEEE Security & Privacy 99 (1), 67-69, 2003
26942003
What is computer security?
M Bishop
IEEE Security & Privacy 99 (1), 67-69, 2003
26942003
Introduction to computer security
M Bishop
Addison-Wesley, 2005
7172005
Checking for race conditions in file accesses
M Bishop, M Dilger
Computing systems 2 (2), 131-152, 1996
4021996
Improving system security via proactive password checking
M Bishop, DV Klein
Computers & Security 14 (3), 233-249, 1995
2081995
Vulnerabilities analysis
M Bishop
Proceedings of the Recent Advances in intrusion Detection, 125-136, 1999
1891999
A critical analysis of vulnerability taxonomies
M Bishop, D Bailey
CALIFORNIA UNIV DAVIS DEPT OF COMPUTER SCIENCE, 1996
1861996
A taxonomy of unix system and network vulnerabilities
M Bishop
Technical Report CSE-95-10, Department of Computer Science, University of …, 1995
1821995
Virtual machine introspection: Observation or interference?
K Nance, M Bishop, B Hay
IEEE Security & Privacy 6 (5), 32-37, 2008
1762008
Storm clouds rising: security challenges for IaaS cloud computing
B Hay, K Nance, M Bishop
2011 44th Hawaii International Conference on System Sciences, 1-7, 2011
1732011
Testing C Programs for Buffer Overflow Vulnerabilities.
E Haugh, M Bishop
NDSS, 2003
1552003
Modeling network intrusion detection alerts for correlation
J Zhou, M Heckman, B Reynolds, A Carlson, M Bishop
ACM Transactions on Information and System Security (TISSEC) 10 (1), 4-es, 2007
1512007
Defining the insider threat
M Bishop, C Gates
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
1452008
Property-based testing: a new approach to testing for assurance
G Fink, M Bishop
ACM SIGSOFT Software Engineering Notes 22 (4), 74-80, 1997
1401997
A Flexible Containment Mechanism for Executing Untrusted Code.
DS Peterson, M Bishop, R Pandey
Usenix Security Symposium, 207-225, 2002
1332002
About penetration testing
M Bishop
IEEE Security & Privacy 5 (6), 84-87, 2007
1312007
The art and science of computer security
MA Bishop
Addison-Wesley Professional, 2002
1242002
The transfer of information and authority in a protection system
M Bishop, L Snyder
Proceedings of the seventh ACM symposium on Operating systems principles, 45-54, 1979
1181979
Attack class: Address spoofing
LT Heberlein, M Bishop
Proceedings of the 19th National Information Systems Security Conference …, 1996
1151996
A standard audit trail format
M Bishop
Lawrence Livermore National Lab., CA (United States), 1995
1041995
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20