Follow
Peter Mell
Title
Cited by
Year
Measuring the Exploitation of Weaknesses in the Wild
P Mell, I Bojanova, CE Galhardo
IT Professional 26 (3), 14-21, 2024
2024
Hardware Security Failure Scenarios: Potential Weaknesses in Hardware Design
P Mell, I Bojanova
National Institute of Standards and Technology, 2024
2024
A Security Perspective on the Web3 Paradigm
D Yaga, P Mell
National Institute of Standards and Technology, 2024
2024
Non-Fungible Token Security
P Mell, D Yaga
NIST Interagency/Internal Report (NISTIR), National Institute of Standards …, 2024
2024
Understanding stablecoin technology and related security considerations
P Mell, P Mell, D Yaga
US Department of Commerce, National Institute of Standards and Technology, 2023
72023
Recommendations for Federal Vulnerability Disclosure Guidelines
KB Schaffer, KB Schaffer, P Mell, H Trinh, I Van Wyk
US Department of Commerce, National Institute of Standards and Technology, 2023
2023
Empirical validation of automated vulnerability curation and characterization
A Okutan, P Mell, M Mirakhorli, I Khokhlov, JCS Santos, D Gonzalez, ...
IEEE Transactions on Software Engineering 49 (5), 3241-3260, 2023
22023
Measuring the common vulnerability scoring system base score equation
P Mell, P Mell, J Spring, D Dugal, S Ananthakrishna, F Casotto, T Fridley, ...
US Department of Commerce, National Institute of Standards and Technology, 2022
82022
The Generation of Software Security Scoring Systems Leveraging Human Expert Opinion
P Mell
2022 IEEE 29th Annual Software Technology Conference (STC), 116-124, 2022
22022
A decade of reoccurring software weaknesses
A Gueye, CEC Galhardo, I Bojanova, P Mell
IEEE security & privacy 19 (6), 74-82, 2021
72021
The Generation of Security Scoring Systems Leveraging Human Expert Opinion
P Mell
arXiv preprint arXiv:2105.13755, 2021
12021
Considerations for digital twin technology and emerging standards
J Voas, P Mell, V Piroumian
National Institute of Standards and Technology, 2021
262021
A Historical and Statistical Studyof the Software Vulnerability Landscape
A Gueye, P Mell
arXiv preprint arXiv:2102.01722, 2021
82021
Measurements of the most significant software security weaknesses
CC Galhardo, P Mell, I Bojanova, A Gueye
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
162020
A suite of metrics for calculating the most significant security relevant software flaw types
P Mell, A Gueye
2020 IEEE 44th Annual Computers, Software, and Applications Conference …, 2020
42020
Augmenting Fiat Currency with an Integrated Managed Cryptocurrency
P Mell
arXiv preprint arXiv:1912.06487, 2019
22019
Implementing a Protocol Native Managed Cryptocurrency
P Mell, A Delaitre, F de Vaulx, P Dessauw
arXiv preprint arXiv:1912.06491, 2019
12019
A taxonomic approach to understanding emerging blockchain identity management systems
L Lesavre, P Varin, P Mell, M Davidson, J Shook
arXiv preprint arXiv:1908.00929, 2019
962019
A taxonomic approach to understanding emerging blockchain identity management systems (draft)
L Lesavre, P Varin, P Mell, M Davidson, J Shook
National Institute of Standards and Technology, 2019
62019
Smart contract federated identity management without third party authentication services
P Mell, J Dray, J Shook
arXiv preprint arXiv:1906.11057, 2019
322019
The system can't perform the operation now. Try again later.
Articles 1–20