Follow
Matt Bishop
Title
Cited by
Year
‘An Extendable Password Checker
M Bishop
USENIX Security Workshop Proceedings, 15-16, 1990
91990
08302 abstracts collection–countering insider threats
M Bishop, D Gollmann, J Hunker, CW Probst
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2008
372008
08302 summary–countering insider threats
CW Probst, J Hunker, M Bishop, D Gollmann
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2008
82008
10341 Report–Insider threats: Strategies for prevention, mitigation, and response
M Bishop, L Coles-Kemp, D Gollmann, J Hunker, CW Probst
Schloss-Dagstuhl-Leibniz Zentrum für Informatik, 2010
42010
2004Annual Index
BJ Alfonsi, B Alfonsi, SL Andresen, M Andrews, AI Antón, AI Antón, ...
2007 Annual Index IEEE Security & Privacy, Volume 6
O Acıiçmez, D Ahmad, MD Aime, C Alberts, AM Ali, WH Allen, R Anderson, ...
2007 Index IEEE Transactions on Dependable and Secure Computing Vol. 4
P Abry, A Agbaria, AAE Ahmed, B Awerbuch, G Badishi, S Bagchi, ...
Ad hoc networks 337, 340, 2007
2007
2010 Index IEEE Transactions on Control Systems Technology Vol. 18
H Abdellatif, A Abouloifa, MD Adams, KH Ahn, R Akmeliawati, AY Alanis, ...
IEEE Transactions on Control Systems Technology 18 (6), 1477, 2010
2010
2012 Index IEEE Transactions on Dependable and Secure Computing| Vol. 9
MA Aguirre, GJ Ahn, MI Alghamdi, M Alsaleh, D Andersson, M Asplund, ...
2017 Index IEEE Systems Journal Vol. 11
M Abdelkhalek Azzouz, A Abdollahi, M Abdullah-Al-Wadud, A Abusorrah, ...
IEEE Systems Journal 11 (4), 2981, 2017
2017
3.3 Inconsistent Deception and Attribution
M Bishop
Cybersafety Threats–from Deception to Aggression, 123, 0
516 Internet Security
M Bishop, S Cheung, J Frank, J Hoagland, S Samorodin, C Wee
Encyclopedia of Computer Science and Technology, 516-526, 2017
2017
A 12-Step Program for Cybersecurity.
EB Talbot, D Frincke, M Bishop
IEEE Security and Privacy, 2010
2010
A Biological Framework for Characterizing Mimicry in Cyber-Deception
S Templeton, M Bishop, K Levitt, M Heckman
European Conference on Cyber Warfare and Security, 508-XIX, 2019
22019
A breadth-first strategy for mating search
H Ganzinger, M Bishop
Automated Deduction—CADE-16: 16th International Conference on Automated …, 1999
181999
A brief history and overview of WISE
M Bishop, L Drevin, L Futcher, WS Leung, N Miloslavskaya, EL Moore, ...
IFIP World Conference on Information Security Education, 3-9, 2021
12021
A Classification Scheme for Security Tools
M Bishop, H Briggs, E Haugh, P LeBlanc
Internet Article: http://seclab. cs. ucdavis. edu/projects/testing/papers …, 2002
32002
A clinic for" secure" programming
M Bishop
IEEE security & privacy 8 (2), 54-56, 2010
272010
A clinic to teach good programming practices
M Bishop, BJ Orvis
Proceedings of the 10th Colloquium for Information Systems Security …, 2006
282006
A comprehensive framework for using iterative analysis to improve human-intensive process security: An election example
LJ Osterweil, M Bishop, HM Conboy, H Phan, BI Simidchieva, GS Avrunin, ...
32017
The system can't perform the operation now. Try again later.
Articles 1–20