Follow
Matt Bishop
Title
Cited by
Year
Toward Common Weakness Enumerations in Industrial Control Systems
DM Nicol, G Shannon, M Akbar, M Bishop, M Chaney, M Luallen
IEEE Security & Privacy 21 (4), 84-93, 2023
2023
An Adaptive Plug-and-Play (PnP) Interactive Platform for an E-Voting Based Cybersecurity Curricula
M Zheng, N Swearingen, W Silva, M Bishop, X Zou
International Symposium on Human Aspects of Information Security and …, 2023
2023
Case study: mapping an e-voting based curriculum to CSEC2017
M Zheng, N Swearingen, S Mills, C Gyurek, M Bishop, X Zou
Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2023
12023
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense
K Ferguson-Walter, S Fugate, C Wang, M Bishop
2023
Autonomous Vehicle Security: Composing Attack, Defense, and Policy Surfaces
M Clifford, M Heller, K Levitt, M Bishop
Proceedings of the 2022 New Security Paradigms Workshop, 90-103, 2022
2022
SecTutor: An Intelligent Tutoring System for Secure Programming
I Ngambeki, M Bishop, J Dai, P Nico, S Mian, O Thao, TNB Huynh, ...
IFIP World Conference on Information Security Education, 17-28, 2022
2022
Validation of a Secure Programming Concept Inventory
I Ngambeki, M Bishop, J Dai, P Nico
Proceedings of the 54th ACM Technical Symposium on Computer Science …, 2022
2022
Explaining radar features for detecting spoofing attacks in connected autonomous vehicles
N Rastogi, S Rampazzi, M Clifford, M Heller, M Bishop, K Levitt
arXiv preprint arXiv:2203.00150, 2022
82022
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense
S Fugate, M Bishop, C Wang, K Ferguson-Walter
2022
Key Challenges in Sanitizing Transportation Data to Protect Sensitive Information
M Bishop
2021
Sanitization of Transportation Data: Policy Implications and Gaps
M Bishop
2021
Beyond NVD: Cybersecurity meets the Semantic Web.
R Aranovich, M Wu, D Yu, K Katsy, B Ahmadnia, M Bishop, V Filkov, ...
Proceedings of the 2021 New Security Paradigms Workshop, 59-69, 2021
82021
Electronic voting technology inspired interactive teaching and learning pedagogy and curriculum development for cybersecurity education
R Hosler, X Zou, M Bishop
IFIP World Conference on Information Security Education, 27-43, 2021
22021
A brief history and overview of WISE
M Bishop, L Drevin, L Futcher, WS Leung, N Miloslavskaya, EL Moore, ...
IFIP World Conference on Information Security Education, 3-9, 2021
12021
Measuring Self-efficacy in Secure Programming
M Bishop, I Ngambeki, S Mian, J Dai, P Nico
IFIP World Conference on Information Security Education, 81-92, 2021
2021
A new method for flow-based network intrusion detection using the inverse Potts model
CFT Pontes, MMC De Souza, JJC Gondim, M Bishop, MA Marotta
IEEE Transactions on Network and Service Management 18 (2), 1125-1136, 2021
772021
Introduction to the minitrack on cyber deception and cyber psychology for defense
M Bishop, C Wang, K Ferguson-Walter, S Fugate
22021
Information security and privacy–challenges and outlook
S Furnell, P Haskell-Dowland, M Agrawal, R Baskerville, A Basu, ...
Advancing Research in Information and Communication Technology: IFIP's …, 2021
22021
Trust-based security; or, trust considered harmful
A Singer, M Bishop
Proceedings of the New Security Paradigms Workshop 2020, 76-89, 2020
62020
Resilient data: An interdisciplinary approach
C Sample, SM Loo, M Bishop
2020 Resilience Week (RWS), 1-10, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20