Toward Common Weakness Enumerations in Industrial Control Systems DM Nicol, G Shannon, M Akbar, M Bishop, M Chaney, M Luallen IEEE Security & Privacy 21 (4), 84-93, 2023 | | 2023 |
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula M Zheng, N Swearingen, W Silva, M Bishop, X Zou International Symposium on Human Aspects of Information Security and …, 2023 | | 2023 |
Case study: mapping an e-voting based curriculum to CSEC2017 M Zheng, N Swearingen, S Mills, C Gyurek, M Bishop, X Zou Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2023 | 1 | 2023 |
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense K Ferguson-Walter, S Fugate, C Wang, M Bishop | | 2023 |
Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces M Clifford, M Heller, K Levitt, M Bishop Proceedings of the 2022 New Security Paradigms Workshop, 90-103, 2022 | | 2022 |
SecTutor: An Intelligent Tutoring System for Secure Programming I Ngambeki, M Bishop, J Dai, P Nico, S Mian, O Thao, TNB Huynh, ... IFIP World Conference on Information Security Education, 17-28, 2022 | | 2022 |
Validation of a Secure Programming Concept Inventory I Ngambeki, M Bishop, J Dai, P Nico Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2022 | | 2022 |
Explaining radar features for detecting spoofing attacks in connected autonomous vehicles N Rastogi, S Rampazzi, M Clifford, M Heller, M Bishop, K Levitt arXiv preprint arXiv:2203.00150, 2022 | 8 | 2022 |
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense S Fugate, M Bishop, C Wang, K Ferguson-Walter | | 2022 |
Key Challenges in Sanitizing Transportation Data to Protect Sensitive Information M Bishop | | 2021 |
Sanitization of Transportation Data: Policy Implications and Gaps M Bishop | | 2021 |
Beyond NVD: Cybersecurity meets the Semantic Web. R Aranovich, M Wu, D Yu, K Katsy, B Ahmadnia, M Bishop, V Filkov, ... Proceedings of the 2021 New Security Paradigms Workshop, 59-69, 2021 | 8 | 2021 |
Electronic voting technology inspired interactive teaching and learning pedagogy and curriculum development for cybersecurity education R Hosler, X Zou, M Bishop IFIP World Conference on Information Security Education, 27-43, 2021 | 2 | 2021 |
A brief history and overview of WISE M Bishop, L Drevin, L Futcher, WS Leung, N Miloslavskaya, EL Moore, ... IFIP World Conference on Information Security Education, 3-9, 2021 | 1 | 2021 |
Measuring Self-efficacy in Secure Programming M Bishop, I Ngambeki, S Mian, J Dai, P Nico IFIP World Conference on Information Security Education, 81-92, 2021 | | 2021 |
A new method for flow-based network intrusion detection using the inverse Potts model CFT Pontes, MMC De Souza, JJC Gondim, M Bishop, MA Marotta IEEE Transactions on Network and Service Management 18 (2), 1125-1136, 2021 | 77 | 2021 |
Introduction to the minitrack on cyber deception and cyber psychology for defense M Bishop, C Wang, K Ferguson-Walter, S Fugate | 2 | 2021 |
Information security and privacy–challenges and outlook S Furnell, P Haskell-Dowland, M Agrawal, R Baskerville, A Basu, ... Advancing Research in Information and Communication Technology: IFIP's …, 2021 | 2 | 2021 |
Trust-based security; or, trust considered harmful A Singer, M Bishop Proceedings of the New Security Paradigms Workshop 2020, 76-89, 2020 | 6 | 2020 |
Resilient data: An interdisciplinary approach C Sample, SM Loo, M Bishop 2020 Resilience Week (RWS), 1-10, 2020 | 3 | 2020 |