‘An Extendable Password Checker M Bishop USENIX Security Workshop Proceedings, 15-16, 1990 | 9 | 1990 |
08302 abstracts collection–countering insider threats M Bishop, D Gollmann, J Hunker, CW Probst Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2008 | 37 | 2008 |
08302 summary–countering insider threats CW Probst, J Hunker, M Bishop, D Gollmann Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2008 | 8 | 2008 |
10341 Report–Insider threats: Strategies for prevention, mitigation, and response M Bishop, L Coles-Kemp, D Gollmann, J Hunker, CW Probst Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2010 | 4 | 2010 |
2004Annual Index BJ Alfonsi, B Alfonsi, SL Andresen, M Andrews, AI Antón, AI Antón, ... | | |
2007 Annual Index IEEE Security & Privacy, Volume 6 O Acıiçmez, D Ahmad, MD Aime, C Alberts, AM Ali, WH Allen, R Anderson, ... | | |
2007 Index IEEE Transactions on Dependable and Secure Computing Vol. 4 P Abry, A Agbaria, AAE Ahmed, B Awerbuch, G Badishi, S Bagchi, ... Ad hoc networks 337, 340, 2007 | | 2007 |
2010 Index IEEE Transactions on Control Systems Technology Vol. 18 H Abdellatif, A Abouloifa, MD Adams, KH Ahn, R Akmeliawati, AY Alanis, ... IEEE Transactions on Control Systems Technology 18 (6), 1477, 2010 | | 2010 |
2012 Index IEEE Transactions on Dependable and Secure Computing| Vol. 9 MA Aguirre, GJ Ahn, MI Alghamdi, M Alsaleh, D Andersson, M Asplund, ... | | |
2017 Index IEEE Systems Journal Vol. 11 M Abdelkhalek Azzouz, A Abdollahi, M Abdullah-Al-Wadud, A Abusorrah, ... IEEE Systems Journal 11 (4), 2981, 2017 | | 2017 |
3.3 Inconsistent Deception and Attribution M Bishop Cybersafety Threats–from Deception to Aggression, 123, 0 | | |
516 Internet Security M Bishop, S Cheung, J Frank, J Hoagland, S Samorodin, C Wee Encyclopedia of Computer Science and Technology, 516-526, 2017 | | 2017 |
A 12-Step Program for Cybersecurity. EB Talbot, D Frincke, M Bishop IEEE Security and Privacy, 2010 | | 2010 |
A Biological Framework for Characterizing Mimicry in Cyber-Deception S Templeton, M Bishop, K Levitt, M Heckman European Conference on Cyber Warfare and Security, 508-XIX, 2019 | 2 | 2019 |
A breadth-first strategy for mating search H Ganzinger, M Bishop Automated Deduction—CADE-16: 16th International Conference on Automated …, 1999 | 18 | 1999 |
A brief history and overview of WISE M Bishop, L Drevin, L Futcher, WS Leung, N Miloslavskaya, EL Moore, ... IFIP World Conference on Information Security Education, 3-9, 2021 | 1 | 2021 |
A Classification Scheme for Security Tools M Bishop, H Briggs, E Haugh, P LeBlanc Internet Article: http://seclab. cs. ucdavis. edu/projects/testing/papers …, 2002 | 3 | 2002 |
A clinic for" secure" programming M Bishop IEEE security & privacy 8 (2), 54-56, 2010 | 27 | 2010 |
A clinic to teach good programming practices M Bishop, BJ Orvis Proceedings of the 10th Colloquium for Information Systems Security …, 2006 | 28 | 2006 |
A comprehensive framework for using iterative analysis to improve human-intensive process security: An election example LJ Osterweil, M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, ... | 3 | 2017 |